YoVDO

Anti-Forensics and Occult Computing Techniques - AIDE 2012

Offered By: YouTube

Tags

Digital Forensics Courses Cybersecurity Courses Cloud Security Courses Data Privacy Courses Anti-Forensics Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore anti-forensics techniques and occult computing in this 59-minute conference talk by Adrian Crenshaw. Delve into topics such as private portable browsers, boot media, selective file wiping and encryption, defragmentation issues, USB device logs, and hibernation files. Learn about timestamp manipulation, shadow copy, booby-trapped devices, and cloud computing security. Discover various wiping tools, including Enhanced Secure Erase, and methods to change file hashes. Gain insights into disk structures, partitioning tricks, and unconventional data destruction methods like thermite use.

Syllabus

Intro
Short Version
Why Occult Computing?
What's this talk about?
Disks, Tracks, Sectors
Private portable browsers
Boot media
Tools for selective file wiping
Selective File Encryption
Defrag issues
USB device log
Hibernation file
Tool/Solution Kiddies
Timestomp
Shadow Copy
Booby Trapped Device?
Two partitions on a thumbdrive
Cloud Computing?
Thermite
Wipe Tools
One wipe?
Enhanced Secure Erase
Other tools
Change the hash of the file


Related Courses

Introduction to Data Analytics for Business
University of Colorado Boulder via Coursera
Digital and the Everyday: from codes to cloud
NPTEL via Swayam
Systems and Application Security
(ISC)² via Coursera
Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn
Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera