Digital Forensics for Pentesters - Hands-On Learning
Video description
Learn about digital forensics, pentesting, and ethical hacking
About This Video
Learn about using Kali Forensic Mode and Autopsy
Explore open source intelligence and OSINT
Learn how to dump Wi-Fi credentials using netsh
In Detail
Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers’ malicious backdoors/malware and trace them back to avoid …
Digital Forensics for Pentesters - Hands-On Learning
Video description
Learn about digital forensics, pentesting, and ethical hacking
About This Video
Learn about using Kali Forensic Mode and Autopsy
Explore open source intelligence and OSINT
Learn how to dump Wi-Fi credentials using netsh
In Detail
Digital forensics is becoming very important in cyber security to detect and backtrack Black Hat criminals. It is essential to remove hackers’ malicious backdoors/malware and trace them back to avoid possible future incidents.
This course acts as digital forensics’ primer for pentesters and cybersecurity professionals wanting to expand their knowledge and add advanced tools and skills to their resumes.
Make sure you understand the difference between watching and applying.
The course is an excellent primer for anyone considering a career in digital forensics. It’s important to understand the difference between digital forensics and computer security.
Who this book is for
This course is for pentesters interested in digital forensic investigations and for anyone interested in digital forensics as it relates to pentesting and ethical hacking.
Chapter 2 : Building Your Forensics Lab Environment Using VirtualBox
Downloading ISO and OVA File for VirtualBox
Create a Virtual Install of CSI Linux 2021.2
Create a Kali Live (Forensic Mode) VM Using VirtualBox
Create a Virtual Install Kali Image Using VirtualBox
Create Virtual Install of Windows 10 Using VirtualBox
Create Virtual Install of Metasploitable2 Using VirtualBox
Chapter 3 : Using Kali Forensic Mode and Autopsy
Video and Lab -Getting Started with Autopsy
Video and Lab - Simulate Creating a Disk Image for a Forensic Analysis
Video and Lab - Examining a Forensic Disk Image Using Autopsy
Chapter 4 : Digital Forensics Case Management
Video and Lab - Installing the WebMap-Nmap Dashboard
Chapter 5 : Open-Source Intelligence (OSINT)
Video and Lab - Conducting OSINT Using CSI Linux Investigator
Video and Lab - Find Social Media Accounts Using Sherlock
Video - OSINT Framework - Overview
Chapter 6 : Using Shodan to Search for Vulnerable Devices
Video and Lab - Preparing CSI Investigator to Use Shodan
Video and Lab - Using Shodan to Find Vulnerable Devices
Video and lab - Using Shodan to Search for Vulnerable Databases
Chapter 7 : Computer Forensics
Video - Attaching an External USB Device in Kali
Video and Lab – Acquiring a Forensic Copy of the Windows Registry
Video and Lab – Analyzing the Windows Registry for Evidence
Video and Lab - Dumping Wi-Fi Credentials Using netsh
Video and Lab - Email Header Analysis
Video and Lab - Using Shellbags to View Hidden or Deleted Folders
Video and Lab - Extracting Thumbnail Images From a Suspect’s Machine
Video and lab - Memory Forensics Using the Volatility Framework
Chapter 8 : Reverse Engineering and Malware Analysis
Video and Lab - Install Ghidra on CSI Linux
Video and Lab - Introduction to Using Ghidra
Video and Lab - Reverse Engineering crackme0x00 Using Ghidra
Video and Lab - Reverse Engineering crackme0x05 Using Ghidra
Video and Lab - Analyzing the WannaCry Killswitch Using Ghidra
Chapter 9 : Stenography
Video and Lab - Using Steghide to Hide and Extract Data
Video and Lab - Using the EXIFtool to Read and Write EXIF Tags
Chapter 10 : Network Forensics Using Wireshark
Video - Overview of Wireshark 3.2
Video - Wireshark Capture Options
Video - Wireshark Toolbar Icons
Video and Lab - Installing a Wireless Adapter in Kali
Video and Lab - Hacking a Wireless Network Using Kali Linux
Video - Capturing Wireless Traffic Using Wireshark
Video and Lab - Capturing a 3-way TCP Handshake Using Wireshark
Chapter 11 : Practice What You learned
Video and Lab - CTF Lab Build for HA: Forensics
Video and lab - Capture flag #1
Video and lab - Capture flag #2
Video and lab - Capture flag #3
Video and lab - Capture flag #4
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept