Cargando…

Mastering Python forensics : master the art of digital forensics and analysis with Python /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Spreitzenbarth, Michael (Autor), Uhrmann, Johann (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2015.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn932247938
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 151215s2015 enka o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d DEBBG  |d DEBSZ  |d VT2  |d CEF  |d WYU  |d UAB  |d UKAHL  |d RDF  |d N$T  |d YDXIT  |d OCL  |d NLW  |d OCLCO  |d OCLCQ 
020 |a 1783988053 
020 |a 1783988045 
020 |a 9781783988044 
020 |a 9781783988051  |q electronic book 
029 1 |a DEBBG  |b BV043968133 
029 1 |a DEBSZ  |b 485786222 
029 1 |a GBVCP  |b 882747207 
035 |a (OCoLC)932247938 
037 |a CL0500000683  |b Safari Books Online 
050 4 |a QA76.73.P98  |b S67 2015 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Spreitzenbarth, Michael,  |e author. 
245 1 0 |a Mastering Python forensics :  |b master the art of digital forensics and analysis with Python /  |c Michael Spreitzenbarth, Johann Uhrmann. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2015. 
300 |a 1 online resource (1 volume) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Community experience distilled 
588 |a Description based upon online resource; title from PDF title page (viewed May 20, 2020). 
500 |a Includes index. 
505 0 |a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Lab and Introduction to Python ctypes; Setting up the Lab; Ubuntu; Python virtual environment (virtualenv); Introduction to Python ctypes; Working with Dynamic Link Libraries; C data types; Defining Unions and Structures; Summary; Chapter 2: Forensic Algorithms; Algorithms; MD5; SHA256; SSDEEP; Supporting the chain of custody; Creating hash sums of full disk images; Creating hash sums of directory trees; Real-world scenarios; Mobile Malware; NSRLquery 
505 8 |a Downloading and installing nsrlsvrWriting a client for nsrlsvr in Python; Summary; Chapter 3: Using Python for Windows and Linux Forensics; Analyzing the Windows Event Log; The Windows Event Log; Interesting Events; Parsing the Event Log for IOC; The python-evtx parser; The plaso and log2timeline tools; Analyzing the Windows Registry; Windows Registry Structure; Parsing the Registry for IOC; Connected USB Devices; User histories; Startup programs; System Information; Shim Cache Parser; Implementing Linux specific checks; Checking the integrity of local user credentials 
505 8 |a Analyzing file meta informationUnderstanding inode; Reading basic file metadata with Python; Evaluating POSIX ACLs with Python; Reading file capabilities with Python; Clustering file information; Creating histograms; Advanced histogram techniques; Summary; Chapter 4: Using Python for Network Forensics; Using Dshell during an investigation; Using Scapy during an investigation; Summary; Chapter 5: Using Python for Virtualization Forensics; Considering virtualization as a new attack surface; Virtualization as an additional layer of abstraction; Creation of rogue machines; Cloning of systems 
505 8 |a Searching for misuse of virtual resourcesDetecting rogue network interfaces; Detecting direct hardware access; Using virtualization as a source of evidence; Creating forensic copies of RAM content; Using snapshots as disk images; Capturing network traffic; Summary; Chapter 6: Using Python for Mobile Forensics; The investigative model for smartphones; Android; Manual Examination; Automated Examination with the help of ADEL; Idea behind the system; Implementation and system workflow; Working with ADEL; Movement profiles; Apple iOS; Getting the Keychain from a jailbroken iDevice 
505 8 |a Manual Examination with libimobiledeviceSummary; Chapter 7: Using Python for Memory Forensics; Understanding Volatility basics; Using Volatility on Android; LiME and the recovery image; Volatility for Android; Reconstructing data for Android; Call history; Keyboard cache; Using Volatility on Linux; Memory acquisition; Volatility for Linux; Reconstructing data for Linux; Analyzing processes and modules; Analyzing networking information; Malware hunting with the help of YARA; Summary; Where to go from here; Index 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Python (Computer program language) 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Forensic sciences  |x Data processing. 
650 2 |a Computer Security 
650 6 |a Python (Langage de programmation) 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Criminalistique  |x Informatique. 
650 7 |a COMPUTERS.  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Forensic sciences  |x Data processing.  |2 fast  |0 (OCoLC)fst00932012 
650 7 |a Python (Computer program language)  |2 fast  |0 (OCoLC)fst01084736 
700 1 |a Uhrmann, Johann,  |e author. 
830 0 |a Community experience distilled. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781783988044/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29507048 
938 |a EBSCOhost  |b EBSC  |n 1089587 
994 |a 92  |b IZTAP