Philip Polstra offers an overview of Python basics before walking you through using Python to perform more challenging forensic tasks. You’ll gain a deeper understanding of FAT and NTFS filesystems and see firsthand how to glean pertinent information from a filesystem image in minutes with Python.
Philip Polstra (aka Dr. Phil) is an internationally known hardware hacker and forensics specialist. Philip teaches computer security and digital forensics at Bloomsburg University of Pennsylvania, develops new penetration testing and forensics hardware, creates video courses for PentesterAcademy, O’Reilly, PluralSight, and others, and performs penetration tests on a consulting basis. Philip has made repeat performances at top conference around the world, including DEFCON, BlackHat, 44CON, GrrCON, BruCON, BSides, and ForenSecure, to name a few. He is also the author of several books, including Hacking and Penetration Testing with Low Power Devices (Syngress, 2014), Linux Forensics (Pentester Academy, 2015), Windows Forensics (Pentester Academy, 2016), and USB Forensics (Pentester Academy, 2017). When not teaching, pentesting, or speaking at a conference, Philip has been known to fly, teach others to fly, build aircraft, and create electronic devices with his children.
Comments on this page are now closed.
©2016, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • firstname.lastname@example.org