万本电子书0元读

万本电子书0元读

顶部广告

Windows Forensics Cookbook电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Oleg Skulkin,Scar de Courcier

出  版  社:Packt Publishing

出版时间:2017-08-04

字       数:22.1万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Maximize the power of Windows Forensics to perform highly effective forensic investigations About This Book ? Prepare and perform investigations using powerful tools for Windows, ? Collect and validate evidence from suspects and computers and uncover clues that are otherwise difficult ? Packed with powerful recipes to perform highly effective field investigations Who This Book Is For If you are a forensic analyst or incident response professional who wants to perform computer forensics investigations for the Windows platform and expand your took kit, then this book is for you. What You Will Learn ? Understand the challenges of acquiring evidence from Windows systems and overcome them ? Acquire and analyze Windows memory and drive data with modern forensic tools. ? Extract and analyze data from Windows file systems, shadow copies and the registry ? Understand the main Windows system artifacts and learn how to parse data from them using forensic tools ? See a forensic analysis of common web browsers, mailboxes, and instant messenger services ? Discover how Windows 10 differs from previous versions and how to overcome the specific challenges it presents ? Create a graphical timeline and visualize data, which can then be incorporated into the final report ? Troubleshoot issues that arise while performing Windows forensics In Detail Windows Forensics Cookbook provides recipes to overcome forensic challenges and helps you carry out effective investigations easily on a Windows platform. You will begin with a refresher on digital forensics and evidence acquisition, which will help you to understand the challenges faced while acquiring evidence from Windows systems. Next you will learn to acquire Windows memory data and analyze Windows systems with modern forensic tools. We also cover some more in-depth elements of forensic analysis, such as how to analyze data from Windows system artifacts, parse data from the most commonly-used web browsers and email services, and effectively report on digital forensic investigations. You will see how Windows 10 is different from previous versions and how you can overcome the specific challenges it brings. Finally, you will learn to troubleshoot issues that arise while performing digital forensic investigations. By the end of the book, you will be able to carry out forensics investigations efficiently. Style and approach This practical guide filled with hands-on, actionable recipes to detect, capture, and recover digital artifacts and deliver impeccable forensic outcomes.
目录展开

Title Page

Copyright

Windows Forensics Cookbook

Credits

About the Authors

About the Reviewer

www.PacktPub.com

Why subscribe?

Customer Feedback

Preface

What this book covers

What you need for this book

Who this book is for

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Conventions

Customer support

Downloading the color images of this book

Errata

Piracy

Questions

Digital Forensics and Evidence Acquisition

Introduction

Why Windows?

Windows file system

Identifying evidence sources

Ensuring evidence is forensically sound

Writing reports

Digital forensic investigation - an international field

What can we do to make things easier for ourselves in the meantime?

Challenges of acquiring digital evidence from Windows systems

Windows Memory Acquisition and Analysis

Introduction

Windows memory acquisition with Belkasoft RAM Capturer

Getting ready

How to do it…

How it works…

See also

Windows memory acquisition with DumpIt

Getting ready

How to do it…

How it works…

See also

Windows memory image analysis with Belkasoft Evidence Center

Getting ready

How to do it...

How it works...

See also

Windows memory image analysis with Volatility

Getting ready

How to do it...

How it works...

See also

Variations in Windows versions

Getting ready

How to do it...

There is more...

Windows Drive Acquisition

Introduction

Drive acquisition in E01 format with FTK Imager

Getting ready

How to do it...

How it works...

See more

Drive acquisition in RAW format with dc3dd

Getting ready

How to do it...

How it works...

See also

Mounting forensic images with Arsenal Image Mounter

Getting ready

How to do it...

How it works...

See also

Windows File System Analysis

Introduction

NTFS Analysis with The Sleuth Kit

Getting ready

How to do it...

How it works...

See also

Undeleting files from NTFS with Autopsy

Getting ready...

How to do it...

How it works...

See also

Undeleting files from ReFS with ReclaiMe File Recovery

Getting ready

How to do it...

How it works...

See also

File carving with PhotoRec

Getting ready

How to do it...

How it works...

See more

Windows Shadow Copies Analysis

Introduction

Browsing and copying files from VSCs on a live system with ShadowCopyView

Getting ready

How to do it...

How it works...

See also

Mounting VSCs from disk images with VSSADMIN and MKLINK

Getting ready

How to do it...

How it works...

See also

Processing and analyzing VSC data with Magnet AXIOM

Getting ready

How to do it...

How it works...

See also

Windows Registry Analysis

Introduction

Extracting and viewing Windows Registry files with Magnet AXIOM

Getting ready

How to do it...

How it works...

See also

Parsing registry files with RegRipper

Getting ready

How to do it...

How it works...

See also

Recovering deleted Registry artifacts with Registry Explorer

Getting ready

How to do it...

How it works...

See also

Registry analysis with FTK Registry Viewer

Getting ready

How to do it...

How it works...

See also

Main Windows Operating System Artifacts

Introduction

Recycle Bin content analysis with EnCase Forensic

Getting ready

How to do it...

How it works...

See also

Recycle bin content analysis with Rifiuti2

Getting ready

How to do it...

How it works...

See also

Recycle bin content analysis with Magnet AXIOM

Getting ready

How to do it...

How it works...

See also

Event log analysis with FullEventLogView

Getting ready

How to do it...

How it works...

See also

Event log analysis with Magnet AXIOM

Getting ready

How to do it...

How it works...

See also

Event log recovery with EVTXtract

Getting ready

How to do it...

How it works...

See also

LNK file analysis with EnCase forensic

Getting ready

How to do it...

How it works...

See also

LNK file analysis with LECmd

Getting ready

How to do it...

How it works...

See also

LNK file analysis with Link Parser

Getting ready

How to do it...

How it works...

See also

Prefetch file analysis with Magnet AXIOM

Getting ready

How to do it...

How it works...

See also

Prefetch file parsing with PECmd

Getting ready

How to do it...

How it works...

See also

Prefetch file recovery with Windows Prefetch Carver

Getting ready

How to do it...

How it works...

See also

Web Browser Forensics

Introduction

Mozilla Firefox analysis with BlackBag's BlackLight

Getting ready

How to do it...

How it works...

See also

Google Chrome analysis with Magnet AXIOM

Getting ready

How to do it...

How it works...

See also

Microsoft Internet Explorer and Microsoft Edge analysis with Belkasoft Evidence Center

Getting ready

How to do it...

How it works...

See also

Extracting web browser data from Pagefile.sys

Getting ready

How to do it...

How it works...

See also

Email and Instant Messaging Forensics

Introduction

Outlook mailbox parsing with Intella

Getting ready

How to do it...

How it works...

See also

Thunderbird mailbox parsing with Autopsy

Getting ready

How to do it...

How it works...

See also

Webmail analysis with Magnet AXIOM

Getting ready

How to do it...

How it works...

See also

Skype forensics with Belkasoft Evidence Center

Getting ready

How to do it...

How it works...

See also

Skype forensics with SkypeLogView

Getting ready

How to do it...

How it works...

See also

Windows 10 Forensics

Introduction

Parsing Windows 10 Notifications

Getting ready

How to do it...

How it works...

See also

Cortana forensics

Getting ready

How to do it...

How it works...

See also

OneDrive forensics

Getting ready

How to do it...

How it works...

See also

Dropbox forensics

Getting ready

How to do it...

How it works...

See also

Windows 10 mail app

Getting ready

How to do it...

How it works...

Windows 10 Xbox App

Getting ready

How to do it...

How it works...

Data Visualization

Introduction

Data visualization with FTK

Getting ready

How to do it...

How it works...

Making a timeline in Autopsy

Getting ready

How to do it...

How it works...

See also

Nuix Web Review & Analytics

Getting ready

How to do it...

How it works...

See also

Troubleshooting in Windows Forensic Analysis

Introduction

Troubleshooting in commercial tools

Troubleshooting in free and open source tools

Troubleshooting when processes fail

Soundness of evidence

It wasn't me

It was a virus / I was hacked

Your process is faulty

Legal and jurisdictional challenges

False positives during data processing with digital forensics software

Taking your first steps in digital forensics

Academia

Corporate

Law enforcement

How do I get started?

Advanced further reading

Books

Websites

Twitter Accounts

累计评论(0条) 1个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部