Pilfering Local Data - Attacker Strategies for Short-Term Local Access
Offered By: YouTube
Course Description
Overview
Explore techniques and tools used by attackers to extract valuable local data during short-term physical access to a device. Learn about boot environments, password hashes, cash information retrieval, and methods for accessing data on various operating systems including Windows XP. Discover encryption practices, useful resources, and gain insights into information security concepts as presented by Louisville InfoSec.
Syllabus
Intro
About Me
Boot Environment
Useful Tools
Reasons Why
Assumptions
Password Hashes
Cash Information
Outlook
Windows XP
SCRAM
Other Tools
Boot Media
More Resources
Louisville InfoSec
Encryption
Related Courses
Diseño de sistemas de información gerencial para intranet con Microsoft AccessUniversidad del Rosario via edX Competencias digitales de ofimática: Microsoft Access
Universitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera Diseño de software para la toma de decisiones organizacionales
Universidad del Rosario via edX Excel to Access: Intro to Microsoft Access for Excel Users
Udemy Access 2007: Shortcuts
LinkedIn Learning