elhacker.INFO Downloads

[ index of contents ]

[ Live Stats ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                              Size  
[Volver] Parent Directory - [Directorio] 1) Welcome to Practical Windows Forensics (PWF)/ - [Directorio] 2) Lab Requirements/ - [Directorio] 3) Setting up your forensic workstation/ - [Directorio] 4) Prepare your target system/ - [Directorio] 5) Data collection process/ - [Directorio] 6) Examination of the forensic data/ - [Directorio] 7.0) Disk analysis introduction/ - [Directorio] 7.1) Windows registry analysis/ - [Directorio] 7.2) User behavior analysis/ - [Directorio] 7.3) Overview of disk structures, partitions and file systems/ - [Directorio] 7.4) Analysis of the Master File Table (MFT)/ - [Directorio] 7.5) Finding evidence of deleted files with USN Journal analysis/ - [Directorio] 7.6) Analyzing evidence of program execution on Windows systems/ - [Directorio] 7.7) Finding evidence of persistence mechanisms/ - [Directorio] 7.8) Uncover malicious activity with Windows event log analysis/ - [Directorio] 8) Windows memory forensic analysis/ - [Directorio] 9) Kitchen-Sink analysis with Super Timelines/ - [Directorio] 10) Reporting/ - [Directorio] 11) Final/ - [TXT] _README.txt 187