# NCtfU - 3/7 (Forensics sixkwnp) (A204) ###### tags: `新手場` `nctfu2021` :::success [toc] ::: :::info 講者 sixkwnp **[Slido 連結](https://app.sli.do/event/mcBG3Mui9YnuvS4SiCE1gU )** ::: ### 錄影連結 [影片](https://youtu.be/a2H8LRAehxg) ### 講者簡報 [簡報 PDF](https://drive.google.com/file/d/1ZMwS4y2G-1uHkYCsu_ZD21TApHhPDX8n/view?usp=share_link) ## 共筆 #### 資安意識 [監視器](http://www.insecam.org/) #### What is CTF 攻擊(找漏洞) #### Steganography File Header Structure [Lab 0x00](https://ctf.hackme.quest/static/television.bmp) [cipher identifier 編碼辨識工具](https://www.dcode.fr/cipher-identifier) [Wireshark filter指令集](https://packetlife.net/media/library/13/Wireshark_Display_Filters.pdf) ### 附錄(連結) [Decode.Fr](https://www.dcode.fr/en) [Audacity](https://www.audacityteam.org/) [HxD](https://mh-nexus.de/en/hxd/) [binwalk](https://github.com/ReFirmLabs/binwalk) [Stegsolve](http://www.caesum.com/handbook/Stegsolve.jar) [FTK Imager](https://www.exterro.com/ftk-imager) [volatility](https://www.volatilityfoundation.org/) [OSINT 工具整理合集](https://start.me/p/GE7JQb/osint) [OSINT 工具整理合集2](https://start.me/p/wMdQMQ/tools) [Sherlock](https://github.com/sherlock-project/sherlock) [PNG Structure介紹](https://webcache.googleusercontent.com/search?q=cache:1saENBHpCYgJ:https://www.cnblogs.com/ECJTUACM-873284962/p/8986391.html&cd=17&hl=zh-TW&ct=clnk&gl=tw) ---