最新消息:请大家多多支持

USB Forensics: Writeblocking and Impersonation

其他教程 dsgsd 152浏览 0评论


USB Forensics: Writeblocking and ImpersonationUSB Forensics: Writeblocking and Impersonation
USB Forensics: Writeblocking and Impersonation
MP4 | Video: AVC 1280×720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours 15M | 263 MB
Genre: eLearning | Language: English

This course will show how to writeblock USB mass storage devices on a Linux computer and how to build two useful microcontroller-based devices. The devices include a USB writeblocker and USB impersonator.

USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you’ll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you’ll explore easily and cheaply writeblocking USB mass storage devices in Linux. Next, you’ll create an affordable USB pocket writeblocker. Finally, you’ll discover how to build a USB impersonator that can bypass endpoint security software. By the end of this course, you’ll know how to writeblock USB drives both on your Linux forensics workstation and using a small device while on the go.

USB Forensics: Writeblocking and ImpersonationUSB Forensics: Writeblocking and Impersonation

Download uploaded
http://uploaded.net/file/warpra9p/USB%20Forensics%20-%20Writeblocking%20and%20Impersonation.part1.rar
http://uploaded.net/file/1sktzsr7/USB%20Forensics%20-%20Writeblocking%20and%20Impersonation.part2.rar
http://uploaded.net/file/5o93pl8c/USB%20Forensics%20-%20Writeblocking%20and%20Impersonation.part3.rar

Download nitroflare
http://nitroflare.com/view/2AE63CE5941305A/USB_Forensics_-_Writeblocking_and_Impersonation.part1.rar
http://nitroflare.com/view/CF9658AC0C41955/USB_Forensics_-_Writeblocking_and_Impersonation.part2.rar
http://nitroflare.com/view/8C6D2A76D12AD53/USB_Forensics_-_Writeblocking_and_Impersonation.part3.rar

Download 百度云
链接: https://pan.baidu.com/s/1i4VlxOD 密码: 9dkm

转载请注明:0daytown » USB Forensics: Writeblocking and Impersonation

您必须 登录 才能发表评论!