Videos

Published on June 27th, 2011 📆 | 6647 Views ⚑

0

Incident Response and Computer Forensics on Rootkits


https://www.ispeech.org


Lets pick up where we left off with the rootkit and post-exploitation video (http://www.youtube.com/watch?v=izv1b-BTQFw). Except, we are now doing incident response.

First you'll see some normal live forensics on the victim and come up with nothing. Then we show how using network forensics techniques (looking at the victim from the outside) we start to see clear evidence of "doh! we've been owned".

We walk through how to see these signs and prove to them that what Windows and traditional forensics is telling them is a LIE in this particular investigation.

You'll learn how to do this type of forensics technique and many more from our InfoSec Institute Computer Forensics Boot Camp: http://www.infosecinstitute.com/courses/computer_forensics_training.html





MORE ON INFOSEC INSTITUTE
Recognized as a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training, InfoSec Institute fortifies organizations of all sizes against security threats with its award-winning security education solutions.

Recognizing that cybersecurity is everyone’s job, the company provides skills training and certification prep courses for security professionals while building the entire workforce’s security aptitude through awareness training and phishing simulations. InfoSec Institute is a Training Industry “Top 20 IT Training Company” and the Security Training & Education Program Gold Winner in Info Security Products Guide’s Global Excellence Awards.

Additional information can be found here:
- SecurityIQ awareness and anti-phishing platform: https://www.infosecinstitute.com/securityiq/
- InfoSec training and certification: https://www.infosecinstitute.com/flex
- InfoSec training and certification features: https://www.infosecinstitute.com/flex/pro/
- InfoSec training and certification guarantees: https://www.infosecinstitute.com/flex/guarantees/
- 100+ training and certification courses: https://www.infosecinstitute.com/courses


2011-06-27 21:11:07

source

Tagged with:



Comments are closed.