Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE
Автор: Motasem Hamdan
Загружено: 2022-05-15
Просмотров: 14514
📄 Cyber Security Certification Notes & Cheat Sheets
https://buymeacoffee.com/notescatalog...
🚀(2nd link) Cyber Security Certification Notes & Cheat Sheets
https://shop.motasem-notes.net/collec...
💡Cyber Security Notes | Membership Access
https://buymeacoffee.com/notescatalog...
🧩Cybersecurity Direct Coaching & Mentoring
https://shop.motasem-notes.net/collec...
🔥Download FREE Cyber Security 101 Study Notes
https://buymeacoffee.com/notescatalog...
🧠 Get Strategic cyber security and tech insights weekly to your email by joining my newsletter below
https://buymeacoffee.com/notescatalog...
📊Blog Writeups
https://www.motasem-notes.net
***
In this video walk-through, we covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation. We also provided the answers for TryHackMe KAPE room.
**********
Writeup
https://motasem-notes.net/computer-fo...
TryHackMe Jr Security Analyst Intro
https://tryhackme.com/r/room/jrsecana...
*******
Store
https://buymeacoffee.com/notescatalog...
Patreon
/ motasemhamdan
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb42481b2
Instagram
/ motasem.hamdan.tech
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6ai...
Twitter
/ manmotasem
Facebook
/ motasemhamdantty
****
0:00 Introduction to CAPE (Kroll Artifact Parser and Extractor)
0:41 Overview of CAPE’s Features
0:52 Forensic Use Cases of CAPE
1:32 Definition of Artifacts in Digital Forensics
2:27 How CAPE Collects and Processes Data
3:03 Understanding Targets in CAPE
4:08 Modules for Processing Artifacts
4:45 Navigating CAPE's Directory Structure
5:11 Using CLI and GUI Interfaces
5:40 Updating CAPE via PowerShell Script
6:18 Configuring Target Files and Compound Targets
7:45 Creating Custom Targets
9:08 Managing Disabled Targets in CAPE
9:46 Setting Target Source and Destination Paths
10:54 Selecting Specific Targets for Data Collection
12:02 Example Challenge: Policy Violation Investigation
12:58 Adding USB and Triage-Related Targets
14:14 Using Module Options for Data Processing
15:01 Defining Module Destination and Output
15:47 Exploring Module Files and Customization
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: