RECOVERING FILES with Autopsy (PicoCTF 2022 #47 'operation-oni')

RECOVERING FILES with Autopsy (PicoCTF 2022 #47 'operation-oni')

John Hammond

2 года назад

30,056 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@johny_dope8575
@johny_dope8575 - 16.05.2022 16:00

1

Ответить
@re70-december32
@re70-december32 - 16.05.2022 16:04

Hiiiii

Ответить
@SESUAV
@SESUAV - 16.05.2022 16:11

I used binwalk too. It was quick and easy using that than autopsy because of command line

Ответить
@msasdc2087
@msasdc2087 - 16.05.2022 16:30

Finnaly, I got your home address.

Ответить
@eavi4645
@eavi4645 - 16.05.2022 16:31

Great video, love the content. Thank you!

Ответить
@johnmcmanus6719
@johnmcmanus6719 - 16.05.2022 16:50

The SSH key wasn't a deleted file though

Ответить
@wisemasterbuilder
@wisemasterbuilder - 16.05.2022 16:56

Love this Format Mighty Friend!



You can lead a horse to water
but ya can't always git'em to drink.

Ответить
@bech2342
@bech2342 - 16.05.2022 17:30

uh, he saw for the first time a kernel source tree 🙊
binwalk FTW!

Ответить
@booruledie3052
@booruledie3052 - 16.05.2022 17:37

cant wait for htb cyber apocalypse videos.

Ответить
@fjr2go
@fjr2go - 16.05.2022 17:46

I like the 'short' informative videos like these. Thanks

Ответить
@TheNobleSavage612
@TheNobleSavage612 - 16.05.2022 17:56

"i need to look for keys" hovers over the key folder and moves on

Ответить
@hallgowrt
@hallgowrt - 16.05.2022 18:25

the audio seemed low
at full volume was I able to hear anything

as always great vid

Ответить
@Zerback
@Zerback - 16.05.2022 18:31

Great content John! Keep it up!

Ответить
@IAmCandal
@IAmCandal - 16.05.2022 18:40

HOLY SHIT BRO YOU DONT EVEN KNOW HOW HELPFUL THIS WAS FOR ME HOMIE

Ответить
@viv_2489
@viv_2489 - 16.05.2022 18:50

Really like the alternate solution / additional extra curricular activity that you mention as applicable....

Ответить
@debarghyamaitra
@debarghyamaitra - 16.05.2022 19:20

I did it with commands icat and fls....it was a lot hectic though!

Ответить
@rationalbushcraft
@rationalbushcraft - 16.05.2022 19:57

I like using autopsy and we don't even do traditional forensics as my state requires you be a PI of all things to do that. But I do use it for data recovery and I even use a hardware write blocker. Probably seems like overkill but I never have to say that I may have changed something so if the end user wants to send it to Ontrack or some other place I can argue that we never changed anything.

Ответить
@ecjb1969
@ecjb1969 - 16.05.2022 20:11

Couldn’t you just midair image; mount -t iso9660 -o loop disk.img image to mount the disk image and then use find to look for SSH keys and the like?

Ответить
@zer001
@zer001 - 16.05.2022 20:35

Nice one as allways!

Ответить
@herrpez
@herrpez - 16.05.2022 20:54

I love your content, but calling things a "gimmick" when they're far from it... that's... grating. :(

Ответить
@maxxinev.pennelope7179
@maxxinev.pennelope7179 - 16.05.2022 22:16

Watching this on the TV cast with my father fingers crossed 🤞 it's not to over my or rather our head(s).

Ответить
@luthfisukma9787
@luthfisukma9787 - 16.05.2022 22:58

are you use linux for daily driver ??

Ответить
@testentry353
@testentry353 - 17.05.2022 00:31

one easy way to remember the file permissions is to know that read is 4, write is 2, and execute is 1
so r-x will be
4+1=5
and rw- will be
4+2=6

Ответить
@guilherme5094
@guilherme5094 - 17.05.2022 01:54

👍

Ответить
@Youtupe69
@Youtupe69 - 17.05.2022 02:01

Whats this GUI, I've used autopsy on windows and it wasnt a web app, had a much nicer GUI... Is it not available on Linux?

Ответить
@BarYamin
@BarYamin - 17.05.2022 11:05

If you want to understand the rwx permission set, it's better to interpret it as binary.
Basically, we have 3 bits that each represent r, w, and x, respectively.
so, let's say I want read & execute, this translates to r-x, which translates in binary to 101, which then in turn converts to 4+1=5 in base10 :)

Ответить
@CA-FE-C0-FF-EE-00
@CA-FE-C0-FF-EE-00 - 18.05.2022 04:15

Watching this file failing the htb CTF xD only 8 challenges done, but I'm alone ^^

Ответить
@yaserbasaad7984
@yaserbasaad7984 - 19.05.2022 03:22

You are Epic

Ответить
@MrToast72
@MrToast72 - 27.06.2022 23:38

Briefly talks about Chmod three digit codes "you can look up resources on how this exactly works" then proceeds to explain how it exactly works lol thank you John, I love when you do that!

Ответить
@omaralhalboosi2713
@omaralhalboosi2713 - 03.08.2022 07:59

Great great video John, but dude you are like sonic speed lol barely catching up , which made this vid a 40 minutes show. But the point is this is great . May God bless you brother

Ответить
@Lacsap3366
@Lacsap3366 - 30.09.2022 03:17

Lol I just mounted the root partition as a loop device with losetup

Ответить
@jreamscape
@jreamscape - 04.02.2024 20:04

thanks dude

Ответить
@lancemarchetti8673
@lancemarchetti8673 - 10.11.2024 14:36

Cool Video...here's a little script kiddie journey..enjoy ZHViLnNoL2FuVnpkSEJoYzNSbExtbDBMekkyWjNRMA

Ответить