Cargando…

Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 /

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, tim...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Carvey, Harlan A. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland : Syngress, 2014.
Edición:Fourth edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn874017518
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 140320s2014 nyua ob 001 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d E7B  |d UMI  |d OCLCO  |d DEBBG  |d DEBSZ  |d YDXCP  |d VLB  |d RIV  |d COO  |d OCLCQ  |d YDX  |d LIV  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCQ  |d OCLCF  |d VVB  |d U3W  |d D6H  |d CEF  |d INT  |d OTZ  |d OCLCA  |d OCLCQ  |d AUD  |d AU@  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 880898386  |a 966353441  |a 993682488  |a 1018193036  |a 1304986380 
020 |a 9780124171749 
020 |a 0124171745 
020 |z 9780124171572 
020 |z 0124171575 
029 1 |a AU@  |b 000052839809 
029 1 |a CHBIS  |b 010295226 
029 1 |a CHVBK  |b 327778407 
029 1 |a DEBBG  |b BV042032773 
029 1 |a DEBBG  |b BV042300052 
029 1 |a DEBSZ  |b 414182464 
029 1 |a DEBSZ  |b 414273001 
029 1 |a CHNEW  |b 001011998 
035 |a (OCoLC)874017518  |z (OCoLC)880898386  |z (OCoLC)966353441  |z (OCoLC)993682488  |z (OCoLC)1018193036  |z (OCoLC)1304986380 
037 |a CL0500000434  |b Safari Books Online 
050 4 |a HV8079.C65  |b C3726 2014eb 
082 0 4 |a 363.25968  |2 23 
049 |a UAMI 
100 1 |a Carvey, Harlan A.,  |e author. 
245 1 0 |a Windows forensic analysis toolkit :  |b advanced analysis techniques for Windows 8 /  |c Harlan Carvey. 
250 |a Fourth edition. 
264 1 |a Rockland :  |b Syngress,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting. Complete coverage and examples of Windows 8 systems Contains lessons from the field, case studies, and war stories Companion online toolkit material, including electronic printable checklists, cheat sheets, custom tools, and walk-throughs. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Front Cover; Windows Forensic Analysis Toolkit; Copyright Page; Contents; Preface; Intended Audience; Organization of This Book; DVD Contents; Acknowledgments; About the Author; About the Technical Editor; 1 Analysis Concepts; Introduction; Analysis concepts; Windows versions; Analysis principles; Goals; Tools versus processes; The tool validation myth-odology; Locard's exchange principle; Avoiding speculation; Direct and indirect artifacts; Least frequency of occurrence; Documentation; Convergence; Virtualization; Setting up an analysis system; Summary; 2 Incident Preparation; Introduction. 
505 8 |a Being prepared to respondQuestions; The importance of preparation; Logs; Data collection; Training; Business models; Summary; 3 Volume Shadow Copies; Introduction; What are "volume shadow copies"?; Registry keys; Live systems; ProDiscover; F-Response; Acquired images; VHD method; VMWare method; Automating VSC access; ProDiscover; Windows 8; Summary; Reference; 4 File Analysis; Introduction; MFT; File system tunneling; TriForce; Event logs; Windows Event Log; Recycle bin; Prefetch files; Scheduled tasks; Jump lists; Hibernation files; Application files; Antivirus logs; Skype; Apple products. 
505 8 |a Image filesSummary; References; 5 Registry Analysis; Introduction; Registry analysis; Registry nomenclature; The registry as a log file; USB device analysis; System hive; Services; Bluetooth; Software hive; Application analysis; NetworkList; NetworkCards; Scheduled tasks; User hives; WordWheelQuery; Shellbags; MenuOrder; MUICache; UserAssist; Photos; Virtual PC; TypedPaths; Additional sources; RegIdleBackup; Volume shadow copies; Virtualization; Memory; Tools; Summary; References; 6 Malware Detection; Introduction; Malware Characteristics; Initial infection vector; Propagation mechanism. 
505 8 |a Persistence mechanismArtifacts; Detecting Malware; Log analysis; Dr. Watson logs; AV scans; AV write ups; Digging deeper; Packed files; Digital signatures; Windows File Protection; Alternate data streams; PE file compile times; Master boot record infectors; Registry analysis; Internet activity; Additional detection mechanisms; Seeded sites; Summary; References; 7 Timeline Analysis; Introduction; Timelines; Data sources; Time formats; Concepts; Benefits; Format; Time; Source; System; User; Description; TLN format; Creating Timelines; File system metadata; Event logs; Windows XP; Windows 7. 
505 8 |a Prefetch filesRegistry data; Additional sources; Parsing events into a timeline; Thoughts on visualization; Case Study; Summary; 8 Correlating Artifacts; Introduction; How-Tos; Correlating Windows shortcuts to USB devices; Demonstrate user access to files; IE browser analysis; Detecting system time change; Who ran defrag?; Determine data exfiltration; Finding something "new"; Summary; 9 Reporting; Introduction; Goals; Incident triage; Case Notes; Documenting your analysis; Reporting; Format; Executive summary; Body; Background; Analysis; Conclusions; Writing tips; Peer review; Summary; Index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Microsoft Windows (Computer file) 
630 0 7 |a Microsoft Windows (Computer file)  |2 fast  |0 (OCoLC)fst01367862 
650 0 |a Computer crimes  |x Investigation  |x Methodology. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Criminalité informatique  |x Enquêtes  |x Méthodologie. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Internet  |x Security measures.  |2 fast  |0 (OCoLC)fst01751426 
776 0 8 |i Print version:  |a Carvey, Harlan A.  |t Windows forensic analysis toolkit.  |b Fourth edition  |z 9780124171572  |w (OCoLC)872701493 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124171572/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ebrary  |b EBRY  |n ebr10849334 
938 |a YBP Library Services  |b YANK  |n 11719719 
994 |a 92  |b IZTAP