1 |
 |
Recovering Pictures After Disk Format (Forensics) |
12 years, 7 months |
31is |
Photorec, recover, format, forensics |
3786 |
None |
2 |
 |
Forensic Examinations 1 - The Crime Scene |
12 years, 2 months |
5hark5ter |
hacking, forensics, bypass, windows, evidence |
7854 |
34 |
3 |
 |
Forensic Examinations 1 - The Crime Scene (With Sound!) |
12 years, 2 months |
5hark5ter |
forensics, hacking, windows, evidence, series |
9484 |
34 |
4 |
 |
Deepsec 2010: Android Reverse Engineering And Forensics |
12 years, 1 month |
Christiaan008 |
Deepsec 2010, smartphone, forensics, android |
4958 |
None |
5 |
 |
Forensic Examinations 2 - The Rules |
12 years, 1 month |
5hark5ter |
forensics, digital forensics |
5439 |
11 |
6 |
 |
Forensic Examinations 3 - The Acquisition |
12 years, 1 month |
5hark5ter |
education, forensics, digital forensics |
5789 |
12 |
7 |
 |
Forensic Examinations 4 - The Examination - Part 2 |
12 years, 1 month |
5hark5ter |
forensics, digital forensics |
4265 |
2 |
8 |
 |
Forensic Examinations 4 - The Examination - Part 4 |
12 years, 1 month |
5hark5ter |
forensics, digital forensics |
3767 |
None |
9 |
 |
Forensic Examinations 4 - The Examination - Part 5 |
12 years, 1 month |
5hark5ter |
forensics, digital forensics |
4310 |
4 |
10 |
 |
Forensic Examinations 4 - The Examination - Part 1 |
12 years, 1 month |
5hark5ter |
forensics, digital forensics |
4975 |
2 |
11 |
 |
Forensic Examinations 4 - The Examination - Part 3 |
12 years, 1 month |
5hark5ter |
forensics, digital forensics |
5012 |
10 |
12 |
 |
Forensic Examinations 5 - File Signatures, Metadata And The Collar Bomber - Part 1 |
12 years |
5hark5ter |
digital forensics, collar bomber, forensics, computer forensics |
5045 |
4 |
13 |
 |
Forensic Examinations 5 - File Signatures, Metadata And The Collar Bomber - Part 2 |
12 years |
5hark5ter |
digital forensics, collar bomber, forensics, computer forensics |
7184 |
3 |
14 |
 |
Forensic Examinations 6 - Bits And Bobs - Part 1 |
12 years |
5hark5ter |
forensics, digital forensics, computer forensics, master boot record, partition, partitions |
4419 |
4 |
15 |
 |
Forensic Examinations 6 - Bits And Bobs - Part 2 |
12 years |
5hark5ter |
forensics, digital forensics, computer forensics, master boot record, partition, partitions |
4235 |
4 |
16 |
 |
Oracle Forensics At Hacktivity 2011 |
11 years, 10 months |
SecurityTube_Bot |
oracle, hacktivity, forensics |
3845 |
None |
17 |
 |
Alternate Data Streams-- An Oldie But A Goodie |
11 years, 9 months |
sketchymoose |
ADS, alternate data streams, malware, forensics, streams, System Internals |
4378 |
1 |
18 |
 |
Pdf Analysis Using Pdf Stream Dumper |
11 years, 9 months |
sketchymoose |
PDF stream dumper, CaptureBAT, contagio, PDF analysis, forensics, malware, REMnux, Didier Stevens |
7376 |
None |
19 |
 |
Usb Flash Drive Forensics, Philip Polstra - 44con 2011 |
11 years, 7 months |
SecurityTube_Bot |
44con, usb, forensics, philip polstra, 44con-2011 |
5411 |
None |
20 |
 |
Clubhack 2011 - How Android Based Phone Helped Me Win American Idol - Part 1 |
11 years, 7 months |
ClubHack |
clubhack, android, forensics, android hacking, reverse engineering, malware analysis, tap jacking, QR code, denial of service, gingerbreak, levitator, exploid, social engineering |
6687 |
None |
21 |
 |
Clubhack 2011 - How Android Based Phone Helped Me Win American Idol - Part 2 |
11 years, 7 months |
ClubHack |
clubhack, android, forensics, android hacking, reverse engineering, malware analysis, tap jacking, QR code, denial of service, gingerbreak, levitator, exploid, social engineering |
5918 |
None |
22 |
 |
Clubhack 2011 - How Android Based Phone Helped Me Win American Idol - Part 3 |
11 years, 7 months |
ClubHack |
clubhack, android, forensics, android hacking, reverse engineering, malware analysis, tap jacking, QR code, denial of service, gingerbreak, levitator, exploid, social engineering |
6074 |
None |
23 |
 |
Forensic Examinations 7 - Indx Buffers |
11 years, 7 months |
5hark5ter |
index buffers, forensics, computer forensics, digital forensics |
5099 |
6 |
24 |
 |
Backtrack 5 Gnome - Bulk Extractor (Bulk_Extractor) |
11 years, 3 months |
Securitytube_Poster |
forensics, Bulk_Extractor |
3362 |
2 |
25 |
 |
Backtrack 5 Gnome - Fatback |
11 years, 3 months |
Securitytube_Poster |
Fatback, forensics |
3671 |
3 |
26 |
 |
Digital Forensics/Data Wiping With Winhex |
11 years, 3 months |
Securitytube_Poster |
winhex, forensics, data |
5739 |
2 |
27 |
 |
Recover A Data Disk With Forensics Tool Ddrescue |
11 years, 3 months |
jibesh_st |
forensics, tool, ddrescue |
6842 |
2 |
28 |
 |
Foxanalysis Plus - Firefox Internet History Analysis |
11 years, 3 months |
Ashish_st |
forensics, history, browsing, data, tool |
4446 |
1 |
29 |
 |
Code Forensics |
11 years, 3 months |
Ashish_st |
code, forensics, .net, java |
3773 |
2 |
30 |
 |
Iphone Forensics &Amp; Data Recovery - Get Deleted Text Messages |
11 years, 3 months |
Ashish_st |
forensics, iPhone, data, recover, hacking |
5284 |
5 |
31 |
 |
Remote Computer Forensics |
11 years, 2 months |
Jacks0n-771 |
computer, forensics, hacking, data, crime, talk |
4214 |
5 |
32 |
 |
In Real World Digital Detectives (Cyber Crime Fighters) |
11 years, 2 months |
tinitee |
hacking, real-world, forensics, crime |
3364 |
None |
33 |
 |
Geek Digital Forensics |
11 years, 2 months |
tinitee |
hacking, forensics, hack, photo |
4141 |
None |
34 |
 |
Finding Evidence In An Online World - Trends And Challenges In Digital Forensics |
11 years, 2 months |
Vulnerable |
forensics, hacking, real-world |
3225 |
None |
35 |
 |
Malware Memory Foresnics |
11 years, 2 months |
Vulnerable |
malware, memory, forensics, hacking, hack |
5576 |
1 |
36 |
 |
Stuxnet - Identifying Rogue Executables Using Volatility |
11 years, 2 months |
HyBrid |
memory, forensics, stuxnet |
3826 |
None |
37 |
 |
Forensic Examinations 9 - Volume Shadow Copies |
10 years, 11 months |
5hark5ter |
digital forensics, computer forensics, forensics, cyber forensics, volume shadow copies, volume shadow copy, csi, autopsy, vssadmin, iscsi |
4837 |
None |
38 |
 |
Memory Forensics With Volatality |
10 years, 10 months |
L33T |
framework, memory, forensics |
4749 |
1 |
39 |
 |
Read Image Gps Tag -Exif Data Viewers |
10 years, 9 months |
Shinigami |
forensics |
3149 |
None |
40 |
 |
Dump Hotmail, Yahoo, Gmail Passwords From The Memory |
10 years, 9 months |
L33T |
forensics, memory, hacking, emails |
7553 |
None |
41 |
 |
Acquire Image For Forensic Investigation |
10 years, 9 months |
tinitee |
forensics, hacking, hack, image |
4341 |
None |
42 |
 |
Dump Password Using Burp-Suite Tool |
10 years, 9 months |
tinitee |
hacking, hack, intruder, password, dump, forensics |
7164 |
None |
43 |
 |
Zeus -- Registry Analysis Using Volatility Framework |
10 years, 8 months |
L33T |
hacking, hack, memory, forensics, registry |
4574 |
None |
44 |
 |
Dump Internet Cache History And Urls Using Volatility Framework |
10 years, 8 months |
L33T |
volatility, forensics, hacking, hack |
7555 |
None |
45 |
 |
Volatility Image Identification And Processes And Dlls Usage |
10 years, 8 months |
L33T |
volatility, forensics, memory |
4462 |
None |
46 |
 |
Volatility Process Memory - Kernel Memory And Objects Usage |
10 years, 8 months |
L33T |
hacking, memory, forensics, kernel-memory |
4596 |
None |
47 |
 |
Volatility - Malware And Rootkits Command Usage |
10 years, 8 months |
L33T |
memory, forensics, hacking, hack, volatility |
6020 |
None |
48 |
 |
Volatility - Networking And Registry Usage |
10 years, 7 months |
L33T |
memory, forensics, network, registry |
4849 |
None |
49 |
 |
Volatility Silentbanker Malware Analysis |
10 years, 7 months |
L33T |
hacking, hack, memory, forensics, hacking |
3905 |
None |
50 |
 |
Foremost Forensic Data Recovery Tool |
10 years, 7 months |
L33T |
forensics, hacking, hack, recovery, data |
4125 |
None |
51 |
 |
Grrcon 2012 Forensics Challenge Solutions With Volatility Framework |
10 years, 6 months |
L33T |
grrcon, forensics, challenge, volatility |
4660 |
2 |
52 |
 |
Jackcr's Forensic Challenge Solutions With Volatility Framework |
10 years, 6 months |
L33T |
forensics, memory, backdoor, analysis |
6150 |
None |
53 |
 |
Digital Forensics And Incident Response |
10 years, 6 months |
Alone |
grrcon-2012, forensics, memory, hacking |
3721 |
1 |
54 |
 |
Investigating Anonymous Press Release With Metadata Of Pdf Using Python |
10 years, 6 months |
Hitesh |
python, forensics, Hitesh, Securitytube |
5248 |
None |
55 |
 |
Online Tech Webinar: Disaster Recovery In Depth |
10 years, 4 months |
tinitee |
forensics, data, recover, disaster |
3662 |
None |
56 |
 |
Nova Hackers John Lankau - Encase Basics |
10 years, 4 months |
tinitee |
hacking, hack, forensics, digital, encase, analysis |
3446 |
None |
57 |
 |
Photoshop Steganography Tutorial - Hide An Image Within An Image |
10 years, 4 months |
tinitee |
Steganography, photo, hide, forensics |
7870 |
None |
58 |
 |
Introduction To Security And Network Forensics: Threats |
10 years, 4 months |
tinitee |
threats, network, forensics, analysis hacking |
3214 |
None |
59 |
 |
Introduction To Security And Network Forensics: Network Forensics |
10 years, 3 months |
Alone |
hacking, network, analysis, forensics |
4462 |
None |
60 |
 |
Android Forensics And Security Testing |
10 years, 3 months |
Alone |
android, forensics, hacking, hack, exploitation |
4949 |
None |
61 |
 |
Offensive Security 2013 - Volatility And Incident Response |
10 years, 3 months |
Alone |
hacking, hack, volatility, forensics |
3972 |
None |
62 |
 |
Forensic Examinations 10 - Shellbags |
10 years, 2 months |
5hark5ter |
Digital forensics, computer forensics, forensics, evidence, shellbags, registry, cybercrime, cyber crime |
4032 |
1 |
63 |
 |
Advanced Forensics Analysis |
10 years, 2 months |
tinitee |
hacking, hack, malware, pdf, forensics |
3456 |
None |
64 |
 |
Part1: Web User Identification: Intro |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3375 |
None |
65 |
 |
Part2: Web User Identification: Characteristics Of Internet Connections |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3315 |
None |
66 |
 |
Part3: Web User Identification: Ip Geolocation |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3418 |
None |
67 |
 |
Part4: Web User Identification: Browser Identification |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3112 |
None |
68 |
 |
Part5: Web User Identification: Borrowing Wifi Connections |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3335 |
None |
69 |
 |
Part6: Web User Identification: Shell &Amp; Cloud Accounts |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3107 |
None |
70 |
 |
Part7: Web User Identification: Anonymizers |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3089 |
None |
71 |
 |
Part8: Web User Identification: Web Browser Privacy Modes |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3233 |
None |
72 |
 |
Part9: Web User Identification: Email Origin Obfuscation |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3220 |
None |
73 |
 |
Part10: Web User Identification: Further Web Browser Attacks &Amp; Defenses |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3504 |
None |
74 |
 |
Part11: Web User Identification: Forensic Database Analysis |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3047 |
None |
75 |
 |
Part12: Web User Identification: Forensic Log Analysis |
10 years, 1 month |
OpenSecurityTraining.Info |
opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization, anonymizers, user identification, user obfuscation, TOR, javascript, html5, geolocation, IP geolocation, geolocation, forensics, computer forensics |
3444 |
None |
76 |
 |
Lsa (Local Security Authority) Secrets-Memory Analysis |
10 years |
tinitee |
hacking, hack, forensics |
2603 |
None |