H3xx Edit
H3xx Edit
  • Видео 4
  • Просмотров 76 390
Virtual Box Install
Virtual Box is free software that supports virtual machines. In this video we cover the installation of VIrtual Box on Windows.
Просмотров: 108

Видео

Installing Fedora
Просмотров 957 лет назад
Details of installing Fedora 26 in VMWare
Kali's Information Gathering Tool Dmitry
Просмотров 1607 лет назад
Brief run though of Dmitry an information gathering tool included in Kali Linux.
FTK Image Loading and Analysis
Просмотров 76 тыс.10 лет назад
Basic overview of using FTK Imager to open and analyze a captured image.

Комментарии

  • @QutaibaJaheel
    @QutaibaJaheel Месяц назад

    (babeltrace)和图形化(TraceCompass

  • @Lairon2700
    @Lairon2700 Месяц назад

    Hi, please make a video of how to perform your lab setup from your book “Hands-On Ethical Hacking Tactics”. It would be much easier to implement.

    • @h3xxedit
      @h3xxedit Месяц назад

      Sure, you working in Windows env or Linux ?

    • @Lairon2700
      @Lairon2700 Месяц назад

      @@h3xxedit Windows

    • @Lairon2700
      @Lairon2700 Месяц назад

      @@h3xxedit Windows

  • @norcalpacific
    @norcalpacific 2 года назад

    What about pulling the windows password hash file from a ram memory capture. Does FTK do this? Can?

    • @h3xxedit
      @h3xxedit 2 года назад

      FTK Imager is supposed to be able to capture memory, I have had mixed results from it. As for the analysis of the mem files with FTK Imager, it really does not do it. It will open the file and display it but it doesn't provide much insight. I cannot speak for the full FTK product as I do not have access to an instance to test, it may have a richer feature set than the imager when it comes to memory analysis.

  • @jassi123jassi
    @jassi123jassi 3 года назад

    how to export the files marked with red cross.

    • @h3xxedit
      @h3xxedit 3 года назад

      If you mean red X, you should still be able to recover those with a right click option. What FTK is telling you is the file has been deleted from the system but it still available. If this is not what you are looking for let me know.

    • @jassi123jassi
      @jassi123jassi 3 года назад

      @@h3xxedit Sir, thank you for your response. The ftk export files is exporting the metadata only, with 0 BYTES BEING TRANSFERED. I mean no data is being exported.

    • @h3xxedit
      @h3xxedit 3 года назад

      @@jassi123jassi I am looking to answer your question. Based on the red X which is what I see when a file has been deleted here is what I believe is going on. When you recover a file and it has 0 bytes it means the pointer is still there however the data is no longer available. You can see this in FTK when you click on the file. Looking in the lower screen it will show you the text it contains, you can also switch to hex view if not selected. Depending on the underlying filesystem ie. FAT, NTFS, etc. you may see the complementing slack space and can get some data out of it.

  • @enayathassani5874
    @enayathassani5874 4 года назад

    Hello Sir; thank you for your lecture. I got a question. I got an image of my laptop's hard drive using the FTK Imager. I then formatted (partitioned) my hard drive and installed another windows OS. I later carved the image, added evidence items using the imager. I noticed that I have everything but they are unreadable (encrypted). I guess by bitlocker was on my laptop was on during imaging. I have my bitlocker key for my laptop. Now, is there any solution for this problem?

  • @enayathassani5874
    @enayathassani5874 4 года назад

    Hello Sir; thank you for your lecture. I got a question. I got an image of my laptop's hard drive using the FTK Imager. I then formatted (partitioned) my hard drive and installed another windows OS. I later carved the image, added evidence items using the imager. I noticed that I have everything but they are unreadable (encrypted). I guess by bitlocker was on my laptop was on during imaging. I have my bitlocker key for my laptop. Now, is there any solution for this problem?

    • @h3xxedit
      @h3xxedit 4 года назад

      I am aware FTK supports bitlocker keys however, I have not had a case to implement it. One article I read suggested mounting the drive outside of FTK and providing the key there. Then use FTK to access the new mount and review the data.

    • @enayathassani5874
      @enayathassani5874 4 года назад

      @@h3xxedit I used Autopsy to mount, it didn't work either. Do you know any other software?

    • @h3xxedit
      @h3xxedit 3 года назад

      Since this last reply I have had use of bitlocker in this format. What I did was use FTK to mount the drive in Windows. When you click the the drive it mounts as it will ask you for the key. Once complete I use FTK to acquire another image of the drive and this image would be without the bitlocker limitation.

  • @jiacheng09
    @jiacheng09 7 лет назад

    Hi, May i ask how can i search the file location in the evidence tree after i found the keyword in the hex section at bottom right

  • @dr.a.j.k676
    @dr.a.j.k676 7 лет назад

    Great video , may I ask how to find information from an image by using FTK like : a) What is the computer name? b) What is the TCP/IP Host name? c) Last shutdown time d) Mounted devices e) Information about the network interface cards f) What are the user accounts available in the machine g) List all user accounts h) What is the last password reset time of the users? i) How many disabled user accounts available and what are the user name of those accounts? j) What are the use IDs that have Administrator access?

    • @h3xxedit
      @h3xxedit 3 года назад

      That is found in the registry keys

  • @Tobbzy04
    @Tobbzy04 8 лет назад

    i like your video, Can you make a video of something like this with Encase too. thanks