![]() HTML, and the odd way in which GitHub renders it all. A special thank you to Ryker Gogolkiewicz for agreeing to tutor me, very last minute, on Markdown vs. Another thanks goes to Tom Hessman for his keen answers to my silly GitHub questions. A big note of thanks to IppSec for his endless wealth of knowledge, and the kindness to share it. Additionally, several of the techniques depicted are a direct by-product of following along with Alex Olsen during his weekly streams (Alex, you are amazing!). ![]() Some of the screenshots are from YouTube video demonstrations by John Hammond, and are used with his permission (thank you, John!). Icanhaspii CTF STUFF This project began in January of 2022 as a set of personal notes I started keeping to better organize my on-going learning. That being said, I didn’t want to allow perfection to be the enemy of good, so if you want the site in a PDF format, I’ll have that out shortly. I struggled with how HTML was rendering, so switched to Markown, but it’s still got some issues. Lastly, huge buckets of gratitude to Julia Evans for allowing me to feature her incredible artwork as part of this CheatSheet! One final note, I’m not very happy with the way this site looks and works. ![]() Icanhaspii CTF STUFF | This project began in January of 2022 as a set of personal notes I started keeping to better organize my on-going learning. If you have any questions, please contact us at. Student will have to show they master the material as discussed in this course and master basic MacOS antiforensic techniques with the tools discussed. Questions about MacOS anti-forensics in comparison to other anti-forensics.Practical exercises MacOS Anti-forensics tooling.Questions about theory behind MacOS anti-forensics tooling.Questions include basic knowledge of anti-forensics (definition, subcategories, theory behind techniques).Students will have to show they understand the arms race and show insight in using anti-forensics with new IT innovations for the MacOS. These questions will be open and multiple-choice. From a description of a new IT innovation regarding the MacOS where computer forensics can be applied, can the student think of a possible anti-forensics technique altering the forensic evidence and why?.From a description of a forensic investigation detecting an anti-forensics operation, what subcategory of anti-forensics was used?.Describe the arms race between forensics investigators and anti-forensics. ![]() Knowing this, you can apply this in your forensic investigation for detecting anti-forensics. It is an interesting topic, because you will see why different tooling was made to apply anti-forensics by criminals to destroy or hide computer forensic evidence. You can learn to use the tooling, but if you do not know the theory behind it, you will make mistakes: a fool with a tool is still a fool. To work with anti-forensics, you first have to know what it is, especially for the MacOS. Introduction: What is MacOS anti-forensics? He is also the founder of TestingSaaS, a softwaretesting & IT marketing agency for researching cloud applications with a focus on SaaS, digital forensics, data science, software testing and security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |