Jonathan Adkins
Arnold Deepfake Avatar
Havoc C2 Walkthrough
Digital Forensic Artifacts and Tools to Analyze Them
Setting up a backdoor by creating a new Windows service using Metasploit
Creating a .dll payload using msfvenom and establishing a meterpreter session
Creating an executable payload using msfvenom and establishing a meterpreter session
How to transfer files using Powershell and Netcat.
A Demonstration on How to Perform .dll Hijacking for Privilege Escalation
Encrypting Payloads
PFSense Setup in Proxmox
Demonstration of winPEAS in Windows 10
Demonstration of an SMB Pivot Using the Havoc C2 Platform
Interviews with a Digital Forensics Detective
Internet Artifacts & Cryptographic Hashes (Lecture)
The Master File Table Lecture Video Part 1
The Flash Translation Layer
Denial of Service Demonstration
File Systems Lecture
Disk Geometry
Data Carving Demonstration
Disk Wiping Demonstration
The Master File Table Lecture Video Part 2
The Master File Table Lecture Video Part 3
The Boot Process
Bypass Antivirus Using a Basic Crypter
Volume Boot Record Demonstration
Proxychains demonstration using Kali Linux
Number Systems Lecture for Digital Forensics
Nikto Vulnerability Assessment Demonstration