Part 1 Introduction
Part 2 Characteristics Of Internet Connections
Part 3 IP Geolocation
Part 4 Browser Identification
Part 5 Borrowing Wifi Connections
Part 6 Shell & Cloud Accounts
Part 7 Anonymizers
Part 8 Web Browser Privacy Modes
Part 9 Email Origin Obfuscation
Part 10 Further Web Browser Attacks
Part 11 Forensic Database Analysis
Part 12 Forensic Log Analysis
https://archive.org/download/Part1WebUserIdentification/PR_WebIdentity_D1P1_Intro.mov
https://archive.org/download/Part2WebUserIdentification/PR_WebIdentity_D1P2_CharacteristicsOfInternetConnections.mov
https://archive.org/download/Part3WebUserIdentification/PR_WebIdentity_D1P3_IPGeolocation.mov
https://archive.org/download/Part4WebUserIdentification/PR_WebIdentity_D1P4_BrowserIdentification.mov
https://archive.org/download/Part5WebUserIdentification/PR_WebIdentity_D1P5_BorrowingWifiConnection.mov
https://archive.org/download/Part6WebUserIdentification/PR_WebIdentity_D1P6_ShellAccounts.mov
https://archive.org/download/Part7WebUserIdentification/PR_WebIdentity_D1P7_Anonymizers.mov
https://archive.org/download/Part8WebUserIdentification/PR_WebIdentity_D1P8_WebBrowserPrivacyModes.mov
https://archive.org/download/Part9WebUserIdentification/PR_WebIdentity_D1P9_EmailObfuscation.mov
https://archive.org/download/Part10WebUserIdentification/PR_WebIdentity_D1P10_FurtherWebBrowserAttacks.mov
https://archive.org/download/Part11WebUserIdentification/PR_WebIdentity_D1P11_ForensicDatabaseAnalysis.mov
https://archive.org/download/Part12WebUserIdentification/PR_WebIdentity_D1P12_ForensicLogAnalysis.mov
Fuente: http://hacksociety.net/Thread-Forensic-Techniques-Video
No hay comentarios:
Publicar un comentario