Old Dog, New Tricks - Forensics With PowerShell

Old Dog, New Tricks - Forensics With PowerShell

44CON Information Security Conference via YouTube Direct link

Requirements

6 of 44

6 of 44

Requirements

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Old Dog, New Tricks - Forensics With PowerShell

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Jareds background
  3. 3 Jareds certifications
  4. 4 What is PowerShell
  5. 5 Hunting Philosophy
  6. 6 Requirements
  7. 7 What is forensics
  8. 8 Typical forensics toolbox
  9. 9 How PowerShell works
  10. 10 Speed
  11. 11 Modules
  12. 12 Download
  13. 13 Unblock Files
  14. 14 Module Path
  15. 15 Power Forensics
  16. 16 Invoke DD
  17. 17 Boot Sectors
  18. 18 Boot Record
  19. 19 Get MBR
  20. 20 Boot Kits
  21. 21 Set Master Boot Record
  22. 22 Boot Code
  23. 23 GPT
  24. 24 UEFI
  25. 25 Get GPT
  26. 26 Get Boot Sector
  27. 27 GPT Partitions
  28. 28 Overview
  29. 29 System Files
  30. 30 Volume Boot
  31. 31 Volume Boot Record
  32. 32 Master File Table
  33. 33 Get File
  34. 34 Individual File Records
  35. 35 Temporal Funding Funnel
  36. 36 Master File Attributes
  37. 37 Standard Information Attributes
  38. 38 File Name Attributes
  39. 39 Data Attributes
  40. 40 NonResident Attributes
  41. 41 Data Runs
  42. 42 Alternate Data Stream
  43. 43 Get Alternate Data Stream
  44. 44 Stream Name

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.