万本电子书0元读

万本电子书0元读

顶部广告

Practical Windows Forensics电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Ayman Shaaban,Konstantin Sapronov

出  版  社:Packt Publishing

出版时间:2016-06-01

字       数:227.0万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Leverage the power of digital forensics for Windows systems About This Book Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade your existing knowledge. Who This Book Is For This book targets forensic analysts and professionals who would like to develop skills in digital forensic analysis for the Windows platform. You will acquire proficiency, knowledge, and core skills to undertake forensic analysis of digital data. Prior experience of information security and forensic analysis would be helpful. You will gain knowledge and an understanding of performing forensic analysis with tools especially built for the Windows platform. What You Will Learn Perform live analysis on victim or suspect Windows systems locally or remotely Understand the different natures and acquisition techniques of volatile and non-volatile data. Create a timeline of all the system actions to restore the history of an incident. Recover and analyze data from FAT and NTFS file systems. Make use of various tools to perform registry analysis. Track a system user's browser and e-mail activities to prove or refute some hypotheses. Get to know how to dump and analyze computer memory. In Detail Over the last few years, the wave of the cybercrime has risen rapidly. We have witnessed many major attacks on the governmental, military, financial, and media sectors. Tracking all these attacks and crimes requires a deep understanding of operating system operations, how to extract evident data from digital evidence, and the best usage of the digital forensic tools and techniques. Regardless of your level of experience in the field of information security in general, this book will fully introduce you to digital forensics. It will provide you with the knowledge needed to assemble different types of evidence effectively, and walk you through the various stages of the analysis process. We start by discussing the principles of the digital forensics process and move on to show you the approaches that are used to conduct analysis. We will then study various tools to perform live analysis, and go through different techniques to analyze volatile and non-volatile data. Style and approach This is a step-by-step guide that delivers knowledge about different Windows artifacts. Each topic is explained sequentially, including artifact analysis using different tools and techniques. These techniques make use of the evidence extracted from infected machines, and are accompanied by real-life examples.
目录展开

Practical Windows Forensics

Practical Windows Forensics

Credits

About the Authors

About the Reviewers

www.PacktPub.com

Why subscribe?

Free access for Packt account holders

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Downloading the color images of this book

Errata

Piracy

Questions

1. The Foundations and Principles of Digital Forensics

What is digital crime?

Digital forensics

Digital evidence

Digital forensic goals

Analysis approaches

Summary

2. Incident Response and Live Analysis

Personal skills

Written communication

Oral communication

Presentation skills

Diplomacy

The ability to follow policies and procedures

Team skills

Integrity

Knowing one's limits

Coping with stress

Problem solving

Time management

Technical skills

Security fundamentals

Security principles

Security vulnerabilities and weaknesses

The Internet

Risks

Network protocols

Network applications and services

Network security issues

Host or system security issues

Malicious code

Programming skills

Incident handling skills

The hardware for IR and Jump Bag

Software

Live versus mortem

Volatile data

Nonvolatile data

Registry data

Remote live response

Summary

3. Volatile Data Collection

Memory acquisition

Issues related to memory access

Choosing a tool

DumpIt

FTK Imager

Acquiring memory from a remote computer using iSCSI

Using the Sleuth Kit

Network-based data collection

Hubs

Switches

Tcpdump

Wireshark

Tshark

Dumpcap

Summary

4. Nonvolatile Data Acquisition

Forensic image

Incident Response CDs

DEFT

Helix

Live imaging of a hard drive

FTK imager in live hard drive acquisition

Imaging over the network with FTK imager

Incident response CDs in live acquisition

Linux for the imaging of a hard drive

The dd tool

dd over the network

Virtualization in data acquisition

Evidence integrity (the hash function)

Disk wiping in Linux

Summary

5. Timeline

Timeline introduction

The Sleuth Kit

Super timeline – Plaso

Plaso architecture

Preprocessing

Collection

Worker

Storage

Plaso in practice

Analyzing the results

Summary

6. Filesystem Analysis and Data Recovery

Hard drive structure

Master boot record

Partition boot sector

The filesystem area in partition

Data area

The FAT filesystem

FAT components

FAT limitations

The NTFS filesystem

NTFS components

Master File Table (MFT)

The Sleuth Kit (TSK)

Volume layer (media management)

Filesystem layer

The metadata layer

istat

icat

ifind

The filename layer

Data unit layer (Block)

blkcat

blkls

Blkcalc

Autopsy

Foremost

Summary

7. Registry Analysis

The registry structure

Root keys

HKEY_CLASSES_ROOT or HKCR

HKEY_LOCAL_MACHINE

HKEY_USERS or HKU

HKEY_CURRENT_USER or HKCU

Mapping a hive to the filesystem

Backing up the registry files

Extracting registry hives

Extracting registry files from a live system

Extracting registry files from a forensic image

Parsing registry files

The base block

Hbin and CELL

Auto-run keys

Registry analysis

RegistryRipper

Sysinternals

MiTeC Windows registry recovery

Summary

8. Event Log Analysis

Event Logs - an introduction

Event Logs system

Security Event Logs

Extracting Event Logs

Live systems

Offline system

Event Viewer

Event Log Explorer

Useful resources

Analyzing the event log – an example

Summary

9. Windows Files

Windows prefetch files

Prefetch file analysis

Windows tasks

Windows Thumbs DB

Thumbcache analysis

Corrupted Windows.edb files

Windows RecycleBin

RECYCLER

$Recycle.bin

Windows shortcut files

Shortcut analysis

Summary

10. Browser and E-mail Investigation

Browser investigation

Microsoft Internet Explorer

History files

History.IE5

IEHistoryView

BrowsingHistoryView

MiTeC Internet History browser

Cache

Content.IE5

IECacheView

Msiecf parser (Plaso framework)

Cookies

IECookiesView

Favorites

FavoritesView

Session restore

MiTeC SSV

Inprivate mode

WebCacheV#.dat

ESEDatabaseView

Firefox

Places.sqlite

MozillaHistoryView

Cookies.sqlite

MozillaCookiesView

Cache

MozillaCacheView

Other browsers

E-mail investigation

Outlook PST file

Outlook OST files

EML and MSG files

DBX (Outlook Express)

PFF Analysis (libpff)

Other tools

Summary

11. Memory Forensics

Memory structure

Memory acquisition

The sources of memory dump

Hibernation file

Crash dump

Page files

Processes in memory

Network connections in memory

The DLL injection

Remote DLL injection

Remote code injection

Reflective DLL injection

API hooking

Memory analysis

The volatility framework

Volatility plugins

imagecopy

raw2dmp

imageprofile

pslist

psscan

pstree

psxview

getsids

dlllist

handles

filescan

procexedump

memdump

svcscan

connections

connscan

sockets

sockscan

Netscan

hivelist and printkey

malfind

vaddump

apihooks

mftparser

Summary

12. Network Forensics

Network data collection

Exploring logs

Using tcpdump

Using tshark

Using WireShark

Fields with more information

Knowing Bro

Summary

appA. Building a Forensic Analysis Environment

Factors that need to be considered

Size

Environment control

Security

Software

Hardware

Virtualization

Virtualization benefits for forensics

The distributed forensic system

GRR

Server installation

Client installation

Browsing with the newly-connected client

Start a new flow

appB. Case Study

Introduction

Scenario

Acquisition

Live analysis

The running processes

Network activities

Autorun keys

Prefetch files

Browser analysis

Postmortem analysis

Memory analysis

Network analysis

Timeline analysis

Summary

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部