Intrusion Auditing Under Windows NT
Offered By: Black Hat via YouTube
Course Description
Overview
Explore intrusion auditing techniques for Windows NT systems in this 43-minute Black Hat USA 1999 conference talk by JD Glaser. Learn how to effectively examine and preserve evidence left behind by intruders for potential criminal prosecution. Discover the limitations of NT's built-in tools and gain insights into using specialized free tools designed for non-destructive auditing. Follow a step-by-step demonstration covering key aspects of post-break-in analysis, including event log examination, file system configuration assessment, permission and file attribute analysis, surrounding system inspection, trojan behavior detection, backdoor identification, and vulnerability mitigation. Enhance your ability to conduct thorough and forensically sound intrusion audits on Windows NT environments.
Syllabus
Black Hat USA 1999 - Intrusion Auditing Under Windows NT
Taught by
Black Hat
Related Courses
DNA DecodedMcMaster University via Coursera Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax Setting up a Forensic Workstation
Pluralsight Enumerating the Network Infrastructure as a Forensics Analyst
Pluralsight OS Analysis with RegRipper
Pluralsight