Description: This video will cover the guidelines that should be followed by forensic examiners when seizing and examining equipment.
The content is dry, I'm afraid, but if you're interested in getting into forensics, this is for you.
If not, feel free to skip to the next video.
Please leave comments.
Tags: forensics , digital forensics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thank you for this video. As you said, somewhat dry, but vital information in this field. I'm pleased that you're back to health. I also had chickedpox when I was an adult and it was far worse than if I'd had it when I was a child. It was certianly more than just a few itchy spots and feeling miserable and under the weather!
As a matter of interest, I saw some videos by Keatron Evans at Infosec. He planted a rootkit on a computer and demonstrated that it worked as it should. He looked at the computer from a forensic point of view, showing that the rootkit was undetectable when assessed from the computer but there was clear evidence when he examined it remotely over the network. That allowed him to poke around more deeply and unearth what had happened. I guess his approach is similar to yours ... do something bad then demonstrate how it can be uncovered.
Diolch yn fawr :)
thanks Man.
Good to see you back! Not a very interesting video but i enjoyed it. Keep up the good work :D
nice video mate not too dry.
whats the job market like for this ?
@Ignatius - Yeah, this is a dry video. Unfortunately it's a topic that needs to be covered if someone wants to get into this field. I'm hoping I can start going to things like Defcon in the future. At the moment, it's an impossibility! As far as doing something bad and then looking back at it forensically, in an ideal world I'd know what the hell I was doing when it came to pen-testing and I could hack a load of virtual machines, examine them and put the stuff up here. Unfortunately, I suck at pen-testing (at the moment!). Maybe I'll get you lot to upload your forensic images somewhere and I'll examine them!
@LordJonesIII - ha ha. You're welcome.
@m0ei - No probs at all. Glad you're still watching!
@Hackker - thanks, mate. It is a dry video - FE4 is where the forensics really starts, Currently setting the stuff up now. Hopefully it'll be far more interesting.
@OBJBOX35 - Thanks a lot. If you're in or around London (or the West Mids) there are quite a lot of opportunities. In Wales, not so much.
id like to do something like this but i dont think theres jobs in it up here short of working for the police
Where are you generally? It may be worth you signing up to www.forensicfocus.com. There's a section on there for jobs. Pretty good stuff.
But yeah, it is limited. And the Police are struggling with posts at the moment too.
infact where i live if u dont work on vmware, a helpdesk, a developer or voip ur pretty much screwed
very necessary!
Again, thanks hackfupanda! I had to put this video up as an optional, only because people need to know this stuff if they want to get into forensics (obviously applies to people in the UK). However, people on the other side of the pond need to look into the info you gave me on the next video. Thanks!