Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Pilfering Local Data - Attacker Strategies for Short-Term Local Access

via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
Explore techniques and tools used by attackers to extract valuable local data during short-term physical access to a device. Learn about boot environments, password hashes, cash information retrieval, and methods for accessing data on various operating systems including Windows XP. Discover encryption practices, useful resources, and gain insights into information security concepts as presented by Louisville InfoSec.

Syllabus

Intro
About Me
Boot Environment
Useful Tools
Reasons Why
Assumptions
Password Hashes
Cash Information
Outlook
Windows XP
SCRAM
Other Tools
Boot Media
More Resources
Louisville InfoSec
Encryption

Reviews

Start your review of Pilfering Local Data - Attacker Strategies for Short-Term Local Access

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.