Practical Windows forensics : leverage the power of digital forensics for Windows systems /
About This BookBuild your own lab environment to analyze forensic data and practice techniques.This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts.It uses specific open source...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Colección: | Community experience distilled.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Copyright
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Table of Contents
- Preface
- Chapter 1: The Foundations and Principles of Digital Forensics
- What is digital crime?
- Digital forensics
- Digital evidence
- Digital forensic goals
- Analysis approaches
- Summary
- Chapter 2: Incident Response and Live Analysis
- Personal skills
- Written communication
- Oral communication
- Presentation skills
- Diplomacy
- The ability to follow policies and procedures
- Team skills
- Integrity
- Knowing one's limits
- Coping with stress
- Problem solving
- Time management
- Technical skills
- Security fundamentals
- Security principles
- Security vulnerabilities and weaknesses
- The Internet
- Risks
- Network protocols
- Network applications and services
- Network security issues
- Host or system security issues
- Malicious code
- Programming skills
- Incident handling skills
- The hardware for IR and Jump Bag
- Software
- Live versus mortem
- Volatile data
- Nonvolatile data
- Registry data
- Remote live response
- Summary
- Chapter 3: Volatile Data Collection
- Memory acquisition
- Issues related to memory access
- Choosing a tool
- DumpIt
- FTK Imager
- Acquiring memory from a remote computer using iSCSI
- Using the Sleuth Kit
- Network-based data collection
- Hubs
- Switches
- Tcpdump
- Wireshark
- Tshark
- Dumpcap
- Summary
- Chapter 4: Nonvolatile Data Acquisition
- Forensic image
- Incident Response CDs
- DEFT
- Helix
- Live imaging of a hard drive
- FTK imager in live hard drive acquisition
- Imaging over the network with FTK imager
- Incident response CDs in live acquisition
- Linux for the imaging of a hard drive
- The dd tool
- dd over the network
- Virtualization in data acquisition
- Evidence integrity (the hash function).
- Disk wiping in Linux
- Summary
- Chapter 5: Timeline
- Timeline introduction
- The Sleuth Kit
- Super timeline
- Plaso
- Plaso architecture
- Preprocessing
- Collection
- Worker
- Storage
- Plaso in practice
- Analyzing the results
- Summary
- Chapter 6: Filesystem Analysis and Data Recovery
- Hard drive structure
- Master boot record
- Partition boot sector
- The filesystem area in partition
- Data area
- The FAT filesystem
- FAT components
- FAT limitations
- The NTFS filesystem
- NTFS components
- Master File Table (MFT)
- The Sleuth Kit (TSK)
- Volume layer (media management)
- Filesystem layer
- The metadata layer
- istat
- icat
- ifind
- The filename layer
- Data unit layer (Block)
- blkcat
- blkls
- Blkcalc
- Autopsy
- Foremost
- Summary
- Chapter 7: Registry Analysis
- The registry structure
- Root keys
- HKEY_CLASSES_ROOT or HKCR
- HKEY_LOCAL_MACHINE
- HKEY_USERS or HKU
- HKEY_CURRENT_USER or HKCU
- Mapping a hive to the filesystem
- Backing up the registry files
- Extracting registry hives
- Extracting registry files from a live system
- Extracting registry files from a forensic image
- Parsing registry files
- The base block
- Hbin and CELL
- Auto-run keys
- Registry analysis
- RegistryRipper
- Sysinternals
- MiTeC Windows registry recovery
- Summary
- Chapter 8: Event Log Analysis
- Event Logs
- an introduction
- Event Logs system
- Security Event Logs
- Extracting Event Logs
- Live systems
- Offline system
- Event Viewer
- Event Log Explorer
- Useful resources
- Analyzing the event log
- an example
- Summary
- Chapter 9: Windows Files
- Windows prefetch files
- Prefetch file analysis
- Windows tasks
- Windows Thumbs DB
- Thumbcache analysis
- Corrupted Windows.edb files
- Windows RecycleBin
- RECYCLER
- Recycle.bin
- Windows shortcut files.
- Shortcut analysis
- Summary
- Chapter 10: Browser and E-mail Investigation
- Browser investigation
- Microsoft Internet Explorer
- History files
- History.IE5
- IEHistoryView
- BrowsingHistoryView
- MiTeC Internet History browser
- Cache
- Content.IE5
- IECacheView
- Msiecf parser (Plaso framework)
- Cookies
- IECookiesView
- Favorites
- FavoritesView
- Session restore
- MiTeC SSV
- Inprivate mode
- WebCacheV#.dat
- ESEDatabaseView
- Firefox
- Places.sqlite
- MozillaHistoryView
- Cookies.sqlite
- MozillaCookiesView
- Cache
- MozillaCacheView
- Other browsers
- E-mail investigation
- Outlook PST file
- Outlook OST files
- EML and MSG files
- DBX (Outlook Express)
- PFF Analysis (libpff)
- Other tools
- Summary
- Chapter 11: Memory Forensics
- Memory structure
- Memory acquisition
- The sources of memory dump
- Hibernation file
- Crash dump
- Page files
- Processes in memory
- Network connections in memory
- The DLL injection
- Remote DLL injection
- Remote code injection
- Reflective DLL injection
- API hooking
- Memory analysis
- The volatility framework
- Volatility plugins
- imagecopy
- raw2dmp
- imageprofile
- pslist
- psscan
- pstree
- psxview
- getsids
- dlllist
- handles
- filescan
- procexedump
- memdump
- svcscan
- connections
- connscan
- sockets
- sockscan
- Netscan
- hivelist and printkey
- malfind
- vaddump
- apihooks
- mftparser
- Summary
- Chapter 12: Network Forensics
- Network data collection
- Exploring logs
- Using tcpdump
- Using tshark
- Using WireShark
- Fields with more information
- Knowing Bro
- Summary
- Appendix A: Building a Forensic Analysis Environment
- Factors that need to be considered
- Size
- Environment control
- Security
- Software
- Hardware
- Virtualization
- Virtualization benefits for forensics.
- The distributed forensic system
- GRR
- Server installation
- Client installation
- Browsing with the newly-connected client
- Start a new flow
- Appendix B: Case Study
- Introduction
- Scenario
- Acquisition
- Live analysis
- The running processes
- Network activities
- Autorun keys
- Prefetch files
- Browser analysis
- Postmortem analysis
- Memory analysis
- Network analysis
- Timeline analysis
- Summary
- Index.