Here is a talk by Wesley McGrew from Defcon 19 about coverting post-exloitation forensics with Metasploit:
-
How to Perform Hadoop Forensics
In this post Chiheb Chebbi shows you how to perform Hadoop forensics. You will learn about… -
Cloud Forensics: Box
It seems we really enjoy forensicating desktop apps for cloud services. Last week we start… -
The Magic of Raw Data Carving
You have used all of the utilities in your expensive forensic suite, and other programs to…
Load More Related Articles
-
Introduction to USB Detective
This video is the next episode of “Introduction to Windows Forensics” series b… -
Forensic Lunch with Maxim Suhanov
This time the “Forensic Lunch” with David Cowen meets Maxim Suhanov – di… -
Volatility Profiles and Windows 10
As of the recording of this video, the current version of Volatility is 2.6; however, even…
Load More In Videos