zoukankan      html  css  js  c++  java
  • 取证学习资料DVD

    http://www.infiniteskills.com/training/learning-computer-forensics.html

    https://www.youtube.com/watch?v=nxpu7ZeK2fM

    https://www.youtube.com/results?search_query=linux+forensics

    https://www.youtube.com/watch?v=r9Ctji9djxI

    https://www.youtube.com/user/robtlee73/videos

    http://www.e-fense.com/helix3pro.php

    https://www.youtube.com/watch?v=zYYCv21I-1I&feature=youtu.be

    https://www.youtube.com/watch?v=BVo0TTEa9Dc

    取证工具:

    https://github.com/volatilityfoundation/volatility

    https://www.mandiant.com/resources/download/redline

    http://cert.at/downloads/software/densityscout_en.html

    http://rjhansen.github.io/nsrllookup/

    https://github.com/dkovar/anal

    https://www.e-fense.com/store/index.php?_a=viewProd&productId=14

    http://www.volatilityfoundation.org/#!24/c12wa

    https://github.com/sleuthkit/sleuthkit/tree/develop/man


    文档:

    http://www.freebuf.com/articles/system/26763.html

    http://drops.wooyun.org/papers/2854

    http://www.forensicswiki.org/wiki/Tools%3aMemory_Imaging#Linux

    http://technet.microsoft.com/en-us/sysinternals/bb897441.aspx

    http://betanews.com/2013/10/28/check-unsigned-files-at-virustotal-with-sysinternals-sigcheck/

    http://staff.washington.edu/dittrich/misc/forensics/



    要购买的书籍:

    http://www.amazon.com/s/ref=sr_pg_2?rh=n%3A283155%2Cn%3A5%2Ck%3AForensics&page=2&keywords=Forensics&ie=UTF8&qid=1412253572



    the art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

    http://www.itpub.net/thread-1713816-1-1.html

    windows forensic analysis toolkit fourth edition advanced analysis techniques for windows 8 pdf

  • 相关阅读:
    c++ 用宏代替常用的函数
    爬取网易云音乐(包括歌词和评论)
    三种常见的单例模式
    函数式编程filter和map的区别
    四种常见排序算法(快速,冒泡,插入,选择排序)
    6.微信撤回消息的获取
    5.微信拜年短信自动回复
    4.深拷贝和浅拷贝
    3.迭代器以及迭代器的作用
    2.生成器计算出斐波那契数列
  • 原文地址:https://www.cnblogs.com/bhlsheji/p/4390521.html
Copyright © 2011-2022 走看看