cyber security

  1. 03 Windows Acquisition - DFIR | Digital Forensics & Incident Response

    03 Windows Acquisition - DFIR | Digital Forensics & Incident Response

    Resources: https://dfircheatsheet.github.io/ https://dfir.it/blog/2015/04/20/memory-acquisition-tools-for-windows/
  2. 02 Intro to data acquisition - DFIR | Digital Forensics & Incident Response

    02 Intro to data acquisition - DFIR | Digital Forensics & Incident Response

    Resources: https://linuxhint.com/best_hardware_write_blockers/ https://www.geeksforgeeks.org/difference-between-volatile-memory-and-non-volatile-memory/ https://www.slideshare.net/primeteacher32/data-acquisition-71268957 https://www.sans.org/cyber-security-courses/battlefield-forensics-and-data-acqu
  3. 01 Introduction - DFIR | Digital Forensics & Incident Response

    01 Introduction - DFIR | Digital Forensics & Incident Response

    4:42 - Correction: 6f not bf Resources: https://blog.veriato.com/the-evolution-of-digital-forensics https://hackmethod.com/dfir-vs-hunt/?v=fbe46383db39 https://zeenea.com/the-difference-between-metadata-data/ https://www.slideshare.net/Shareb123/disk-structure-72295677 https://dfir.science/dfs101/df
  4. Memory Hacking | Part 0

    Memory Hacking | Part 0

    Correct me if I am wrong thanks in advance.
Top