From 2359ab6dd2bc0f70dc572ae4ec70041574d491e6 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Mon, 19 Feb 2018 15:22:26 +0700 Subject: [PATCH] [Articles][Digital Forensics and Incident Response] Bruteforcing Linux Full Disk Encryption (LUKS) with hashcat - The Forensic way --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index d1ed1d3..4e924cb 100644 --- a/README.md +++ b/README.md @@ -82,6 +82,7 @@ My curated list of awesome links, resources and tools #### Unix/Linux +- [Bruteforcing Linux Full Disk Encryption (LUKS) with hashcat - The Forensic way!](https://blog.pnb.io/2018/02/bruteforcing-linux-full-disk-encryption.html) - [Can an SSH session be taken from memory?](https://security.stackexchange.com/questions/148082/can-an-ssh-session-be-taken-from-memory) - [INTRO TO LINUX FORENSICS](https://countuponsecurity.com/2017/04/12/intro-to-linux-forensics/) - [Linux Memory Forensics: Dissecting the User Space Process Heap](https://articles.forensicfocus.com/2017/10/16/linux-memory-forensics-dissecting-the-user-space-process-heap/)