O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. BackTrack Forensics

In this chapter, we will cover:

  • Intrusion detection and log analysis
  • Recursive directory encryption/decryption
  • Scanning for signs of rootkits
  • Recovering data from a problematic source
  • Retrieving a Windows password
  • Resetting a Windows password
  • Looking at the Windows registry entries

Introduction

Computer forensics involves using various means to analyze, report, and recover information from computers or digital storage media, generally for legal purposes. The outcome in general is to provide the information gathered in such a way that it is useful for the person requesting the information. This includes the recovery of passwords, analyzing computer break-ins or attempts, recovering data from a hard drive after it's been "erased", ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required