Alternate Data Streams - a hacking and forensics howto
Alternate Data Streams are a way to store data on a machine that is not readily accessible to users. Using ADS, files are not accessible by Windows operating system and they do not show up in any file directory. Windows generates it's own ADS and most P2P software typically utilize ADS.
In this video, one of the bonus labs from the InfoSec Institute Computer Forensic Online Training, we will examine Alternate Data Streams:
* How to create them manually.
* How to read them.
* How to find them if you think they are on a system but not where they might be.
We will also do a brief demonstration of ADS Spy, a tool specifically designed to locate Alternate Data Streams.
MORE ON INFOSEC INSTITUTE
Recognized as a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training, InfoSec Institute fortifies organizations of all sizes against security threats with its award-winning security education solutions.
Recognizing that cybersecurity is everyone’s job, the company provides skills training and certification prep courses for security professionals while building the entire workforce’s security aptitude through awareness training and phishing simulations. InfoSec Institute is a Training Industry “Top 20 IT Training Company” and the Security Training & Education Program Gold Winner in Info Security Products Guide’s Global Excellence Awards.
Additional information can be found here:
- SecurityIQ awareness and anti-phishing platform: https://www.infosecinstitute.com/securityiq/
- InfoSec training and certification: https://www.infosecinstitute.com/flex
- InfoSec training and certification features: https://www.infosecinstitute.com/flex/pro/
- InfoSec training and certification guarantees: https://www.infosecinstitute.com/flex/guarantees/
- 100+ training and certification courses: https://www.infosecinstitute.com/courses
Видео Alternate Data Streams - a hacking and forensics howto канала Infosec
In this video, one of the bonus labs from the InfoSec Institute Computer Forensic Online Training, we will examine Alternate Data Streams:
* How to create them manually.
* How to read them.
* How to find them if you think they are on a system but not where they might be.
We will also do a brief demonstration of ADS Spy, a tool specifically designed to locate Alternate Data Streams.
MORE ON INFOSEC INSTITUTE
Recognized as a 2018 Gartner Peer Insights Customers’ Choice for Security Awareness Computer-Based Training, InfoSec Institute fortifies organizations of all sizes against security threats with its award-winning security education solutions.
Recognizing that cybersecurity is everyone’s job, the company provides skills training and certification prep courses for security professionals while building the entire workforce’s security aptitude through awareness training and phishing simulations. InfoSec Institute is a Training Industry “Top 20 IT Training Company” and the Security Training & Education Program Gold Winner in Info Security Products Guide’s Global Excellence Awards.
Additional information can be found here:
- SecurityIQ awareness and anti-phishing platform: https://www.infosecinstitute.com/securityiq/
- InfoSec training and certification: https://www.infosecinstitute.com/flex
- InfoSec training and certification features: https://www.infosecinstitute.com/flex/pro/
- InfoSec training and certification guarantees: https://www.infosecinstitute.com/flex/guarantees/
- 100+ training and certification courses: https://www.infosecinstitute.com/courses
Видео Alternate Data Streams - a hacking and forensics howto канала Infosec
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Alternate Data Streams on Windows (NTFS)](https://i.ytimg.com/vi/qBrFW3gpjpM/default.jpg)
![Intro to Computer Forensics: Module 4: Forensic imaging](https://i.ytimg.com/vi/Jw9luZuFhZE/default.jpg)
![Intro to IT Security & Forensics - Module 4: Forensics Imaging](https://i.ytimg.com/vi/R0GpT5dsfvE/default.jpg)
![Alternative File Streams In NTFS](https://i.ytimg.com/vi/kZ-jjtl-Cg4/default.jpg)
![Alternate Data Streams Technique](https://i.ytimg.com/vi/QpX_6t-Nprk/default.jpg)
![Hiring and training a new employee can cost more than $16,000 | Cyber Work Podcast](https://i.ytimg.com/vi/UTAgUAerOSc/default.jpg)
![Hiding Files On Windows Using Python (Alternate Data Streams)](https://i.ytimg.com/vi/HXBjb6j0Y2s/default.jpg)
![027 FAT part2 Using Active Disk Editor to view an image : Windows Forensics](https://i.ytimg.com/vi/Zb6dzE3LY4s/default.jpg)
![An Introduction to Cybersecurity Careers](https://i.ytimg.com/vi/-AkuKKJ8dN0/default.jpg)
![Windows Registry As Fast As Possible](https://i.ytimg.com/vi/E6ROLfd8RFo/default.jpg)
![Computer Forensics - Forensic Toolkit [Practical]](https://i.ytimg.com/vi/kZS2CyZfHwg/default.jpg)
![Intro to Computer Forensics: Module 5: Forensic recovery](https://i.ytimg.com/vi/KKQqTbTH9c8/default.jpg)
![Linux Bash Tutorial 6 How To Redirect Standard Output Streams](https://i.ytimg.com/vi/XHZYJLsGArU/default.jpg)
![NTFS Alternate Data Streams (Defence Evasion)](https://i.ytimg.com/vi/S4MBzeni9Eo/default.jpg)
![Upskilling to deepen employee engagement and retention | Cyber Work Podcast](https://i.ytimg.com/vi/-ji5aLwXyGQ/default.jpg)
![NTFS file system explained: understanding resident and non-resident files - Computer forensics](https://i.ytimg.com/vi/BG1gQ4Ta79M/default.jpg)
![Utilities: Command Line Utilities + PowerShell with Ryan Leap](https://i.ytimg.com/vi/OofhiQuqQAY/default.jpg)
![How to Hide Data in an Image (jpg) File: Steganography](https://i.ytimg.com/vi/xxSbjUAuzSU/default.jpg)
![Flip the funnel: Fixing the cybersecurity talent pipeline challenge | Cyber Work Podcast](https://i.ytimg.com/vi/6i1Ao3XE85o/default.jpg)