У нас вы можете посмотреть бесплатно Data Artifacts, Analysis Results and Reporting in Autopsy 4.19+ или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
This is a mini-course on Autopsy. See chapter times below. You might want to watch Part 1 first - Starting a new case in Autopsy: • Starting a New Digital Forensic Inves... Autopsy is a free, open-source, full-features digital forensic investigation tool kit. It is developed by Basis Technology and a large open-source community. You can use Autopsy as the basis to conduct a full digital forensic investigation. You can also expand Autopsy with modules written in Java and Python. Thank you to our Members and Patrons, but especially to our Investigators, TheRantingGeek and Roman! Thank you so much! We review the data artifacts and analysis results sections after ingesting a Windows 10 physical disk image in Autopsy 4.19. We walk through what each of the artifacts looks like and how they can be used in digital forensic investigations. During our forensic analysis of a Windows 10 disk image, we reconstruct nmap installation and usage as an example. Then we use Autopsy to produce an artifact report that we can use as a reference for our final forensic investigation report. 00:00 Autopsy Data Artifacts 00:41 Exploring the Windows 10 disk image 01:50 Autopsy: Data Artifacts 02:15 Installed Programs 03:52 Metadata 05:00 Operating System Information 05:54 Recent Documents 08:12 Recycle Bin 08:48 Run Programs 10:47 Run Programs - Verify with additional evidence 12:27 Autopsy analysis procedure overview 12:56 Shell Bags 14:02 USB Device Attached 15:25 Web Accounts 15:52 Web Bookmarks 16:00 Web Cache 16:25 Web Cookies 17:16 Web Downloads 18:36 Web Form Autofill 18:51 Web History 19:45 Web Search 21:55 Autopsy: Analysis Results 22:00 Encryption Suspected 22:36 EXIF Metadata 23:23 Extension Mismatch Detected 24:33 Interesting Files 25:02 Keyword Hits 27:29 Previously Unseen 28:36 User Content Suspected 28:49 Web Account Type 29:32 Web Categories 29:54 Artifacts and Results Overview 30:10 Bookmarked items review 31:01 Generate an artifact report based on bookmarks 32:26 Example full Autopsy report 32:41 How to use an Autopsy report 33:36 Conclusions 🚀 Full Digital Forensic Courses → https://learn.dfir.science Links: Autopsy Software: https://www.autopsy.com/ HxD Hex Editor Software: https://mh-nexus.de/en/hxd/ Practice Data: Windows 10 multi-part disk image - https://archive.org/details/africa-df... Related Books: Practical Linux Forensics: A Guide for Digital Investigators (https://amzn.to/3gzXCh9) Digital Forensics with Open Source Tools (https://amzn.to/34FBrUe) #Autopsy #forensics #investigation #case #dfir 010001000100011001010011011000110110100101100101011011100110001101100101 Get more Digital Forensic Science 👍 Subscribe → https://bit.ly/2Ij9Ojc ❤️ YT Member → https://bit.ly/DFIRSciMember ❤️ Patreon → / dfirscience 🕸️ Blog → https://DFIR.Science 🤖 Code → https://github.com/DFIRScience 🐦 Follow → / dfirscience 📰 DFIR Newsletter → https://bit.ly/DFIRNews 010100110111010101100010011100110110001101110010011010010110001001100101 Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Please link back to the original video. If you want to use this video for commercial purposes, please contact us first. We would love to see what you are doing.