Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE

Описание к видео Computer Forensics Tools | Kroll Artifact Parser and Extractor | TryHackMe KAPE

In this video walk-through, we covered KAPE as a computer forensics tool to extract forensics artifacts and process them for forensics investigation. We also provided the answers for TryHackMe KAPE room.
**********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
   / @motasemhamdan  
*********
Writeup
https://motasem-notes.net/computer-fo...
TryHackMe Jr Security Analyst Intro
https://tryhackme.com/r/room/jrsecana...
*******
Store
https://buymeacoffee.com/notescatalog...
Patreon
  / motasemhamdan  
LinkedIn
[1]:   / motasem-hamdan-7673289b  
[2]:   / motasem-eldad-ha-bb42481b2  
Instagram
  / mastermindstudynotes  
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6ai...
Twitter
  / manmotasem  
Facebook
  / motasemhamdantty  
****
0:00 Introduction to CAPE (Kroll Artifact Parser and Extractor)
0:41 Overview of CAPE’s Features
0:52 Forensic Use Cases of CAPE
1:32 Definition of Artifacts in Digital Forensics
2:27 How CAPE Collects and Processes Data
3:03 Understanding Targets in CAPE
4:08 Modules for Processing Artifacts
4:45 Navigating CAPE's Directory Structure
5:11 Using CLI and GUI Interfaces
5:40 Updating CAPE via PowerShell Script
6:18 Configuring Target Files and Compound Targets
7:45 Creating Custom Targets
9:08 Managing Disabled Targets in CAPE
9:46 Setting Target Source and Destination Paths
10:54 Selecting Specific Targets for Data Collection
12:02 Example Challenge: Policy Violation Investigation
12:58 Adding USB and Triage-Related Targets
14:14 Using Module Options for Data Processing
15:01 Defining Module Destination and Output
15:47 Exploring Module Files and Customization

Комментарии

Информация по комментариям в разработке