zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[PentesterAcademy] Linux Forensics
magnet:?xt=urn:btih:606385dbab6e5baf2c3852f127f94052268b680e&dn=[PentesterAcademy] Linux Forensics
磁力链接详情
Hash值:
606385dbab6e5baf2c3852f127f94052268b680e
点击数:
176
文件大小:
2.74 GB
文件数量:
106
创建日期:
2018-5-29 00:42
最后访问:
2024-12-26 08:41
访问标签:
PentesterAcademy
Linux
Forensics
文件列表详情
001-Linux001w.mp4 30.27 MB
002-Linux002-Forensic-Basics.mp4 25.83 MB
003-First-steps.mp4 40.34 MB
004-Creating-a-Linux-forensics-USB-drive-part1.mp4 31.39 MB
005-Creating-a-Linux-forensics-USBdrive-part2.mp4 17.37 MB
006-Determining-if-there-was-an-incident-part1.mp4 37.97 MB
007-Determining-if-an-incident-happened-part2-Netcat.mp4 33.23 MB
008-Determining-if-there-was-an-incident-part3-server-scripts.mp4 34.61 MB
009-Determing-if-there-was-an-incident-part4-client-scripts.mp4 29.25 MB
010-Determing-if-there-was-an-incident-part5-running-scripts.mp4 31.7 MB
011-Determing-if-there-was-an-incident-part6-what-to-collect.mp4 25.99 MB
012-Determining-if-there-was-an-incident-part7-collecting-initial-data.mp4 38.21 MB
013-Determining-if-there-was-an-incident-part8-analyzing-the-log.mp4 55.41 MB
014-Live-analysis-Part1-First-Steps.mp4 39.56 MB
015-Live-analysis-part2-memory-acquisition-basics.mp4 25.5 MB
016-Live-analysis-part3-compiling-LiME.mp4 25.78 MB
017-Live-analysis-part4-dumping-RAM-with-LiME.mp4 19.93 MB
018-Shutting-down-the-subject-system.mp4 9.43 MB
019-Disk-imaging-basics.mp4 27.66 MB
020-Creating-a-disk-image-from-a-virtual-machine-hard-drive.mp4 29.2 MB
021-Software-write-blocking-with-udev-rules.mp4 38.94 MB
022-Creating-an-image-from-a-physical-drive.mp4 50.91 MB
023-Mounting-image-files-part1-MBR-basics.mp4 28.73 MB
024-Mounting-an-image-part2-using-python-to-mount-mbr-based-images.mp4 44.2 MB
025-Mounting-image-files-part3-Extended-Partitions.mp4 18.25 MB
026-Mounting-a-disk-image-part4-automatically-mounting-an-extended-partition-with-Python.mp4 31.09 MB
027-Mounting-an-image-file-part5-GUID-partitions.mp4 42.77 MB
028-Mounting-an-image-part6-mounting-GUID-partitions-with-Python.mp4 41.68 MB
029-First-steps-after-mounting-an-image-part1-building-a-timeline-as-a-CSV-file.mp4 25.76 MB
030-First-steps-after-mounting-an-image-part2-opening-a-CSV-file-LibreOffice-Calc.mp4 54.45 MB
031-First-steps-after-mounting-an-image-part3-creating-a-MySQL-database-with-file-metadata.mp4 32.18 MB
032-First-steps-after-mounting-an-image-part4-importing-passwd-and-group-files-into-your-database.mp4 46.01 MB
033-First-steps-after-mounting-an-image-part5-creating-a-timeline-in-the-database.mp4 32.95 MB
034-First-steps-after-mounting-an-image-part6-examining-the-timeline.mp4 52.32 MB
035-First-steps-after-mounting-an-image-part7-extracting-user-bash-history-files.mp4 28.25 MB
036-First-steps-after-mounting-an-image-part8-examing-bash-history-files.mp4 48.13 MB
037-First-steps-after-mounting-an-image-file-part9-extracting-system-logs.mp4 22.48 MB
038-First-steps-after-loading-an-image-part10-examining-system-logs.mp4 39.79 MB
039-First-steps-after-mounting-an-image-part11-extracting-successful-and-unsuccessful-login-information.mp4 44.67 MB
040-First-steps-after-mounting-an-image-part12-examining-logins.mp4 28.4 MB
041-Filesystem-analysis-part1-Ext-filesystem-basics.mp4 36.85 MB
042-Filesystem-analysis-part2-superblocks.mp4 47.03 MB
043-Filesystem-analysis-part3-Ext-filesystem-compatible-features.mp4 34.79 MB
044-Filesystem-analysis-part4-Ext-filesystem-incompatible-features.mp4 30.43 MB
045-Filesystem-analysis-part5-ext-filesystem-read-only-compatible-features.mp4 26.49 MB
046-Filesystem-forensics-part6-reading-the-superblock-with-python.mp4 45.21 MB
047-Filesystem-analysis-part7-reading-the-block-group-descriptors-with-python.mp4 29.9 MB
048-Filesystem-analysis-part8-Getting-the-big-picture-by-combining-superblock-and-group-descriptor-information.mp4 36.57 MB
049-Filesystem-analysis-part9-running-our-final-script.mp4 18.75 MB
050-Inodes-part1-finding-things-that-are-out-of-place.mp4 27.58 MB
051-Inodes-part2-using-Python-to-find-inodes-that-are-out-of-place.mp4 30.7 MB
052-Inodes-part3-digging-deeper-into-inodes.mp4 17.8 MB
053-inodes-part4-using-builtin-tools-and-the-sleuth-kit-to-examine-inodes.mp4 22.22 MB
054-Inodes-part5-Inode-extensions-and-details.mp4 18.54 MB
055-Inodes-part6-from-inode-to-file.mp4 19.42 MB
056-Inodes-part7-adding-support-for-extents-to-our-python-scripts.mp4 13.22 MB
057-Inodes-part8-connecting-inodes-to-filenames-directory-entries.mp4 20 MB
058-Inodes-part9-extending-our-Python-code-to-cat-files-from-inode-numbers.mp4 24.08 MB
059-Inodes-part10-using-Python-to-read-directories-from-inode-numbers.mp4 26.57 MB
060-Inodes-part11-Inodes-and-extended-attributes.mp4 20.91 MB
061-Inodes-part12-using-Python-to-read-extended-attributes-from-an-image.mp4 18.51 MB
062-Memory-analysis-part1-Building-a-Volatility-profile.mp4 16.64 MB
063-Memory-analysis-part2-Getting-process-information-with-volatility.mp4 26.32 MB
064-Memory-analysis-part3-More-about-processes.mp4 26.75 MB
065-Memory-analysis-part4-Process-maps-and-dumps.mp4 23.42 MB
066-Memory-analysis-part5-getting-bash-information-with-volatility.mp4 21.51 MB
067-Memory-analysis-part6-using-volatility-check-plugins.mp4 26.39 MB
068-Memory-analysis-part7-getting-network-information-with-Volatility.mp4 21.62 MB
069-Memory-analysis-part8-getting-filesystem-information-from-Volatility.mp4 28.05 MB
070-Memory-analysis-part9-more-filesystem-information-from-Volatility.mp4 17.92 MB
071-Introducing-a-more-advanced-attack.mp4 12.71 MB
072-Running-scripts-against-our-second-subject.mp4 20.73 MB
073-Analyzing-the-results-of-running-inital-scan.mp4 31.79 MB
074-Banner-grabbing-the-second-subject.mp4 7.51 MB
075-Using-Volatility-process-listing-commands-on-pas2.mp4 12.68 MB
076-digging-deeper-into-suspicious-processes-on-pas2-with-Volatility.mp4 20.07 MB
077-using-Volatility-to-create-process-maps-and-dumps-on-pas2.mp4 14.43 MB
078-examing-bash-histories-on-pas2.mp4 28.09 MB
079-using-Volatility-check-functions-on-pas2.mp4 11.78 MB
080-using-volatility-networking-functions-on-pas2.mp4 15.99 MB
081-using-Volatility-filesystem-functions-on-pas2.mp4 14.47 MB
082-pas2-filesystem-analysis-part1-webserver-logs.mp4 20.95 MB
083-pas2-filesystem-analysis-part2-webserver-vulnerabilities.mp4 14.11 MB
084-pas2-filesystem-analsys-part3-mysql-logs.mp4 11.06 MB
085-pas2-filesystem-analysis-part4-looking-at-hidden-directories.mp4 14.68 MB
086-pas2-filesystem-analysis-part5-creating-a-timeline.mp4 17.01 MB
087-pas2-filesystem-analysis-part6-web-payloads.mp4 20.83 MB
088-pas2-filesystem-analysis-part7-packet-captures.mp4 19.51 MB
089-pas2-filesystem-analysis-part8-logins.mp4 14.9 MB
090-Malware-part1-the-file-command.mp4 12.09 MB
091-malware-part2-is-it-a-known-file.mp4 15.69 MB
092-malware-part3-using-strings.mp4 15.52 MB
093-malware-part4-using-nm.mp4 14.68 MB
094-malware-part5-using-ldd.mp4 7.37 MB
095-malware-part6-intro-to-elf.mp4 13.89 MB
096-malware-part7-more-fun-with-readelf.mp4 18.07 MB
097-malware-part8-looking-into-program-sections-and-segments.mp4 36.3 MB
098-malware-part9-setting-up-a-sandbox.mp4 8.35 MB
099-malware-part10-strace.mp4 22.62 MB
100-malware-analysis-part11-ltrace.mp4 10.03 MB
101-malware-part12-gdb-disassembly.mp4 24.2 MB
102-malware-part13-gdb-info-functions.mp4 35.09 MB
103-malware-part14-running-xingyi_bindshell-in-gdb.mp4 34.13 MB
104-malware-part15-running-xingyi_rootshell-in-gdb.mp4 24.45 MB
105-malware-part16-obfuscation.mp4 35.69 MB
106-the-road-ahead.mp4 22.14 MB
其他位置