1 |
 |
Recovering Pictures After Disk Format (Forensics) |
11 years, 4 months |
31is |
Photorec, recover, format, forensics |
3256 |
None |
2 |
 |
Forensic Examinations 1 - The Crime Scene |
10 years, 11 months |
5hark5ter |
hacking, forensics, bypass, windows, evidence |
6920 |
34 |
3 |
 |
Forensic Examinations 1 - The Crime Scene (With Sound!) |
10 years, 11 months |
5hark5ter |
forensics, hacking, windows, evidence, series |
8494 |
34 |
4 |
 |
Deepsec 2010: Android Reverse Engineering And Forensics |
10 years, 11 months |
Christiaan008 |
Deepsec 2010, smartphone, forensics, android |
4412 |
None |
5 |
 |
Forensic Examinations 2 - The Rules |
10 years, 10 months |
5hark5ter |
forensics, digital forensics |
4874 |
11 |
6 |
 |
Forensic Examinations 3 - The Acquisition |
10 years, 10 months |
5hark5ter |
education, forensics, digital forensics |
5195 |
12 |
7 |
 |
Forensic Examinations 4 - The Examination - Part 2 |
10 years, 10 months |
5hark5ter |
forensics, digital forensics |
3666 |
2 |
8 |
 |
Forensic Examinations 4 - The Examination - Part 4 |
10 years, 10 months |
5hark5ter |
forensics, digital forensics |
3235 |
None |
9 |
 |
Forensic Examinations 4 - The Examination - Part 5 |
10 years, 10 months |
5hark5ter |
forensics, digital forensics |
3667 |
4 |
10 |
 |
Forensic Examinations 4 - The Examination - Part 1 |
10 years, 10 months |
5hark5ter |
forensics, digital forensics |
4429 |
2 |
11 |
 |
Forensic Examinations 4 - The Examination - Part 3 |
10 years, 10 months |
5hark5ter |
forensics, digital forensics |
4441 |
10 |
12 |
 |
Forensic Examinations 5 - File Signatures, Metadata And The Collar Bomber - Part 1 |
10 years, 9 months |
5hark5ter |
digital forensics, collar bomber, forensics, computer forensics |
4495 |
4 |
13 |
 |
Forensic Examinations 5 - File Signatures, Metadata And The Collar Bomber - Part 2 |
10 years, 9 months |
5hark5ter |
digital forensics, collar bomber, forensics, computer forensics |
6510 |
3 |
14 |
 |
Forensic Examinations 6 - Bits And Bobs - Part 1 |
10 years, 9 months |
5hark5ter |
forensics, digital forensics, computer forensics, master boot record, partition, partitions |
3697 |
4 |
15 |
 |
Forensic Examinations 6 - Bits And Bobs - Part 2 |
10 years, 9 months |
5hark5ter |
forensics, digital forensics, computer forensics, master boot record, partition, partitions |
3696 |
4 |
16 |
 |
Oracle Forensics At Hacktivity 2011 |
10 years, 7 months |
SecurityTube_Bot |
oracle, hacktivity, forensics |
3266 |
None |
17 |
 |
Alternate Data Streams-- An Oldie But A Goodie |
10 years, 6 months |
sketchymoose |
ADS, alternate data streams, malware, forensics, streams, System Internals |
3763 |
1 |
18 |
 |
Pdf Analysis Using Pdf Stream Dumper |
10 years, 6 months |
sketchymoose |
PDF stream dumper, CaptureBAT, contagio, PDF analysis, forensics, malware, REMnux, Didier Stevens |
6130 |
None |
19 |
 |
Usb Flash Drive Forensics, Philip Polstra - 44con 2011 |
10 years, 5 months |
SecurityTube_Bot |
44con, usb, forensics, philip polstra, 44con-2011 |
4815 |
None |
20 |
 |
Clubhack 2011 - How Android Based Phone Helped Me Win American Idol - Part 1 |
10 years, 4 months |
ClubHack |
clubhack, android, forensics, android hacking, reverse engineering, malware analysis, tap jacking, QR code, denial of service, gingerbreak, levitator, exploid, social engineering |
5882 |
None |
21 |
 |
Clubhack 2011 - How Android Based Phone Helped Me Win American Idol - Part 2 |
10 years, 4 months |
ClubHack |
clubhack, android, forensics, android hacking, reverse engineering, malware analysis, tap jacking, QR code, denial of service, gingerbreak, levitator, exploid, social engineering |
5158 |
None |
22 |
 |
Clubhack 2011 - How Android Based Phone Helped Me Win American Idol - Part 3 |
10 years, 4 months |
ClubHack |
clubhack, android, forensics, android hacking, reverse engineering, malware analysis, tap jacking, QR code, denial of service, gingerbreak, levitator, exploid, social engineering |
5317 |
None |
23 |
 |
Forensic Examinations 7 - Indx Buffers |
10 years, 4 months |
5hark5ter |
index buffers, forensics, computer forensics, digital forensics |
4546 |
6 |
24 |
 |
Backtrack 5 Gnome - Bulk Extractor (Bulk_Extractor) |
10 years, 1 month |
Securitytube_Poster |
forensics, Bulk_Extractor |
3045 |
2 |
25 |
 |
Backtrack 5 Gnome - Fatback |
10 years, 1 month |
Securitytube_Poster |
Fatback, forensics |
3321 |
3 |
26 |
 |
Digital Forensics/Data Wiping With Winhex |
10 years |
Securitytube_Poster |
winhex, forensics, data |
5085 |
2 |
27 |
 |
Recover A Data Disk With Forensics Tool Ddrescue |
10 years |
jibesh_st |
forensics, tool, ddrescue |
6042 |
2 |
28 |
 |
Foxanalysis Plus - Firefox Internet History Analysis |
10 years |
Ashish_st |
forensics, history, browsing, data, tool |
3883 |
1 |
29 |
 |
Code Forensics |
10 years |
Ashish_st |
code, forensics, .net, java |
3178 |
2 |
30 |
 |
Iphone Forensics &Amp; Data Recovery - Get Deleted Text Messages |
10 years |
Ashish_st |
forensics, iPhone, data, recover, hacking |
4747 |
5 |
31 |
 |
Remote Computer Forensics |
10 years |
Jacks0n-771 |
computer, forensics, hacking, data, crime, talk |
3554 |
5 |
32 |
 |
In Real World Digital Detectives (Cyber Crime Fighters) |
9 years, 11 months |
tinitee |
hacking, real-world, forensics, crime |
2855 |
None |
33 |
 |
Geek Digital Forensics |
9 years, 11 months |
tinitee |
hacking, forensics, hack, photo |
3419 |
None |
34 |
 |
Finding Evidence In An Online World - Trends And Challenges In Digital Forensics |
9 years, 11 months |
Vulnerable |
forensics, hacking, real-world |
2698 |
None |
35 |
 |
Malware Memory Foresnics |
9 years, 11 months |
Vulnerable |
malware, memory, forensics, hacking, hack |
4798 |
1 |
36 |
 |
Stuxnet - Identifying Rogue Executables Using Volatility |
9 years, 11 months |
HyBrid |
memory, forensics, stuxnet |
3255 |
None |
37 |
 |
Forensic Examinations 9 - Volume Shadow Copies |
9 years, 8 months |
5hark5ter |
digital forensics, computer forensics, forensics, cyber forensics, volume shadow copies, volume shadow copy, csi, autopsy, vssadmin, iscsi |
4270 |
None |
38 |
 |
Memory Forensics With Volatality |
9 years, 7 months |
L33T |
framework, memory, forensics |
4168 |
1 |
39 |
 |
Read Image Gps Tag -Exif Data Viewers |
9 years, 6 months |
Shinigami |
forensics |
2814 |
None |
40 |
 |
Dump Hotmail, Yahoo, Gmail Passwords From The Memory |
9 years, 6 months |
L33T |
forensics, memory, hacking, emails |
6849 |
None |
41 |
 |
Acquire Image For Forensic Investigation |
9 years, 6 months |
tinitee |
forensics, hacking, hack, image |
3681 |
None |
42 |
 |
Dump Password Using Burp-Suite Tool |
9 years, 6 months |
tinitee |
hacking, hack, intruder, password, dump, forensics |
6544 |
None |
43 |
 |
Zeus -- Registry Analysis Using Volatility Framework |
9 years, 5 months |
L33T |
hacking, hack, memory, forensics, registry |
3850 |
None |
44 |
 |
Dump Internet Cache History And Urls Using Volatility Framework |
9 years, 5 months |
L33T |
volatility, forensics, hacking, hack |
6344 |
None |
45 |
 |
Volatility Image Identification And Processes And Dlls Usage |
9 years, 5 months |
L33T |
volatility, forensics, memory |
3862 |
None |
46 |
 |
Volatility Process Memory - Kernel Memory And Objects Usage |
9 years, 5 months |
L33T |
hacking, memory, forensics, kernel-memory |
3927 |
None |
47 |
 |
Volatility - Malware And Rootkits Command Usage |
9 years, 5 months |
L33T |
memory, forensics, hacking, hack, volatility |
5324 |
None |
48 |
 |
Volatility - Networking And Registry Usage |
9 years, 4 months |
L33T |
memory, forensics, network, registry |
4254 |
None |
49 |
 |
Volatility Silentbanker Malware Analysis |
9 years, 4 months |
L33T |
hacking, hack, memory, forensics, hacking |
3250 |
None |
50 |
 |
Foremost Forensic Data Recovery Tool |
9 years, 4 months |
L33T |
forensics, hacking, hack, recovery, data |
3544 |
None |
51 |
 |
Grrcon 2012 Forensics Challenge Solutions With Volatility Framework |
9 years, 3 months |
L33T |
grrcon, forensics, challenge, volatility |
3987 |
2 |
52 |
 |
Jackcr's Forensic Challenge Solutions With Volatility Framework |
9 years, 3 months |
L33T |
forensics, memory, backdoor, analysis |
5205 |
None |
53 |
 |
Digital Forensics And Incident Response |
9 years, 3 months |
Alone |
grrcon-2012, forensics, memory, hacking |
3174 |
1 |
54 |
 |
Investigating Anonymous Press Release With Metadata Of Pdf Using Python |
9 years, 3 months |
Hitesh |
python, forensics, Hitesh, Securitytube |
4568 |
None |
55 |
 |
Online Tech Webinar: Disaster Recovery In Depth |
9 years, 1 month |
tinitee |
forensics, data, recover, disaster |
3008 |
None |
56 |
 |
Nova Hackers John Lankau - Encase Basics |
9 years, 1 month |
tinitee |
hacking, hack, forensics, digital, encase, analysis |
2905 |
None |
57 |
 |
Photoshop Steganography Tutorial - Hide An Image Within An Image |
9 years, 1 month |
tinitee |
Steganography, photo, hide, forensics |
7142 |
None |
58 |
 |
Introduction To Security And Network Forensics: Threats |
9 years, 1 month |
tinitee |
threats, network, forensics, analysis hacking |
2687 |
None |
59 |
 |
Introduction To Security And Network Forensics: Network Forensics |
9 years |
Alone |
hacking, network, analysis, forensics |
4093 |
None |
60 |
 |
Android Forensics And Security Testing |
9 years |
Alone |
android, forensics, hacking, hack, exploitation |
4425 |
None |
61 |
 |
Offensive Security 2013 - Volatility And Incident Response |
9 years |
Alone |
hacking, hack, volatility, forensics |
3445 |
None |
62 |
 |
Forensic Examinations 10 - Shellbags |
8 years, 11 months |
5hark5ter |
Digital forensics, computer forensics, forensics, evidence, shellbags, registry, cybercrime, cyber crime |
3427 |
1 |
63 |
 |
Advanced Forensics Analysis |
8 years, 11 months |
tinitee |
hacking, hack, malware, pdf, forensics |
3064 |
None |
64 |
 |
Part1: Web User Identification: Intro |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2801 |
None |
65 |
 |
Part2: Web User Identification: Characteristics Of Internet Connections |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2630 |
None |
66 |
 |
Part3: Web User Identification: Ip Geolocation |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2850 |
None |
67 |
 |
Part4: Web User Identification: Browser Identification |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2540 |
None |
68 |
 |
Part5: Web User Identification: Borrowing Wifi Connections |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2761 |
None |
69 |
 |
Part6: Web User Identification: Shell &Amp; Cloud Accounts |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2524 |
None |
70 |
 |
Part7: Web User Identification: Anonymizers |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2531 |
None |
71 |
 |
Part8: Web User Identification: Web Browser Privacy Modes |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2651 |
None |
72 |
 |
Part9: Web User Identification: Email Origin Obfuscation |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2662 |
None |
73 |
 |
Part10: Web User Identification: Further Web Browser Attacks &Amp; Defenses |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2812 |
None |
74 |
 |
Part11: Web User Identification: Forensic Database Analysis |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2489 |
None |
75 |
 |
Part12: Web User Identification: Forensic Log Analysis |
8 years, 10 months |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
2859 |
None |
76 |
 |
Lsa (Local Security Authority) Secrets-Memory Analysis |
8 years, 10 months |
tinitee |
hacking, hack, forensics |
2216 |
None |