lunes, 9 de marzo de 2015

Recursos de informatica forense

Vídeos dignos de tener en nuestra biblioteca:

Part 1 Introduction
Part 2 Characteristics Of Internet Connections
Part 3 IP Geolocation
Part 4 Browser Identification
Part 5 Borrowing Wifi Connections
Part 6 Shell & Cloud Accounts
Part 7 Anonymizers
Part 8 Web Browser Privacy Modes
Part 9 Email Origin Obfuscation
Part 10 Further Web Browser Attacks
Part 11 Forensic Database Analysis
Part 12 Forensic Log Analysis


https://archive.org/download/Part1WebUserIdentification/PR_WebIdentity_D1P1_Intro.mov

https://archive.org/download/Part2WebUserIdentification/PR_WebIdentity_D1P2_CharacteristicsOfInternetConnections.mov

https://archive.org/download/Part3WebUserIdentification/PR_WebIdentity_D1P3_IPGeolocation.mov

https://archive.org/download/Part4WebUserIdentification/PR_WebIdentity_D1P4_BrowserIdentification.mov

https://archive.org/download/Part5WebUserIdentification/PR_WebIdentity_D1P5_BorrowingWifiConnection.mov

https://archive.org/download/Part6WebUserIdentification/PR_WebIdentity_D1P6_ShellAccounts.mov

https://archive.org/download/Part7WebUserIdentification/PR_WebIdentity_D1P7_Anonymizers.mov

https://archive.org/download/Part8WebUserIdentification/PR_WebIdentity_D1P8_WebBrowserPrivacyModes.mov

https://archive.org/download/Part9WebUserIdentification/PR_WebIdentity_D1P9_EmailObfuscation.mov

https://archive.org/download/Part10WebUserIdentification/PR_WebIdentity_D1P10_FurtherWebBrowserAttacks.mov

https://archive.org/download/Part11WebUserIdentification/PR_WebIdentity_D1P11_ForensicDatabaseAnalysis.mov

https://archive.org/download/Part12WebUserIdentification/PR_WebIdentity_D1P12_ForensicLogAnalysis.mov


Fuente:  http://hacksociety.net/Thread-Forensic-Techniques-Video

No hay comentarios:

Publicar un comentario