Cargando…

PowerShell and Python together : targeting digital investigations /

Chapter 3: PowerShell Scripting Targeting Investigation; Basic Facts About PowerShell Scripts; Example 1: The EventProcessor PowerShell Script; EventLog CmdLets; Retrieving More Specific Eventlog Information; Creating the Script; Step One: Define the Challenge; Step Two: Create the Script in Stages;...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hosmer, Chet (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Apress, [2019]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1091029056
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 190401s2019 nyu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d YDX  |d GW5XE  |d EBLCP  |d UKMGB  |d UPM  |d OCLCF  |d TEFOD  |d VT2  |d LQU  |d OCLCQ  |d OCLCO  |d UKAHL  |d LEATE  |d OCLCQ  |d BRF  |d UMI  |d DCT  |d NLW  |d OCLCO  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO 
015 |a GBB970593  |2 bnb 
016 7 |a 019352837  |2 Uk 
019 |a 1091248610  |a 1099776578  |a 1103265511  |a 1105176328  |a 1110886795  |a 1122813931  |a 1153012754  |a 1162750415  |a 1179144117  |a 1192344359  |a 1204024878  |a 1240512941 
020 |a 9781484245040  |q (electronic bk.) 
020 |a 1484245040  |q (electronic bk.) 
020 |a 9781484245057  |q (print) 
020 |a 1484245059 
020 |z 9781484245033 
020 |z 1484245032 
024 7 |a 10.1007/978-1-4842-4504-0  |2 doi 
024 8 |a 10.1007/978-1-4842-4 
029 1 |a AU@  |b 000065198599 
029 1 |a AU@  |b 000065257686 
029 1 |a AU@  |b 000066972210 
029 1 |a AU@  |b 000067074495 
029 1 |a AU@  |b 000067094774 
029 1 |a AU@  |b 000067556456 
029 1 |a CHNEW  |b 001084569 
029 1 |a CHVBK  |b 592047806 
029 1 |a UKMGB  |b 019352837 
035 |a (OCoLC)1091029056  |z (OCoLC)1091248610  |z (OCoLC)1099776578  |z (OCoLC)1103265511  |z (OCoLC)1105176328  |z (OCoLC)1110886795  |z (OCoLC)1122813931  |z (OCoLC)1153012754  |z (OCoLC)1162750415  |z (OCoLC)1179144117  |z (OCoLC)1192344359  |z (OCoLC)1204024878  |z (OCoLC)1240512941 
037 |a com.springer.onix.9781484245040  |b Springer Nature 
037 |a B0D85CCA-7035-49FE-B1E5-A31D21BD2496  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.7 
072 7 |a COM  |x 051010  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UR  |2 thema 
082 0 4 |a 005.13  |2 23 
049 |a UAMI 
100 1 |a Hosmer, Chet,  |e author. 
245 1 0 |a PowerShell and Python together :  |b targeting digital investigations /  |c Chet Hosmer. 
264 1 |a New York, NY :  |b Apress,  |c [2019] 
264 4 |c Ã2019 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed April 2, 2019). 
505 0 |a Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: An Introduction to PowerShell for Investigators; A Little PowerShell History; How Is PowerShell Used Today?; How Do You Experiment with PowerShell?; Navigating PowerShell ISE; PowerShell CmdLets; What Is a CmdLet?; Introduction to Some Key CmdLets; Get-Help; Get-Process; Get-Member; Challenge Problems: Investigative CmdLets to Explore; Challenge One: Executing a "Find" Based on File Extension; Challenge Two: Examining Network Settings 
505 8 |a Challenge Three: Examining Firewall SettingsChallenge Four: Your Chance to Explore; Summary; Chapter 2: PowerShell Pipelining; What Is CmdLet Pipelining?; Example 1: Get-Service; Example 2: Get-Process; PowerShell Variables; PowerShell Automatic Variables; Breaking Down the CmdLet Usage for Example 2; Adding the NetTCPConnections CmdLet; How to Discover CmdLets?; Using PowerShell Variables with CmdLets; ForEach-Object; Creating a Single Pipeline Solution to Example 2; Resolving Remote IP Addresses; Adding a Transcript to Track Your Activities; Challenge Problem: CmdLet Experimentation 
505 8 |a Example 2: USB Device Usage DiscoveryCreate the Script; Step One: Recent Accessing USB Activity; Invoke-Command PowerShell CmdLet; Step Two: Create the USBAcquire PowerShell Script; USBAcquire Script Execution; USBAcquire Get-Help Result; Challenge Problem: Create File Inventory List with Hashes; Summary; Chapter 4: Python and Live Investigation/Acquisition; What Is "By Example"?; Directing PowerShell with Python; Launching PowerShell CmdLets from Python; Creating a System Files Baseline with PowerShell and Python; Creating the Baseline with Python; Verifying the Baseline with Python 
505 8 |a Overview of the New Code Sections in VerifyBaseline.pyOverview of Python Execution with PowerShell; Challenge Problem: Perform Remote Script Execution; Summary; Chapter 5: PowerShell/Python Investigation Example; Enable PowerShell Remoting; Gathering and Analyzing Remote Evidence; Invoking Remote Access; Building a PowerShell Script for DnsCache Acquisition; Python Script and PowerShell CacheAquire Script; Overview of Client DNS Cache Acquisition and Search; Challenge Problem: Multiple Target Computer DNSCache Acquisition; Summary; Chapter 6: Launching Python from PowerShell 
520 |a Chapter 3: PowerShell Scripting Targeting Investigation; Basic Facts About PowerShell Scripts; Example 1: The EventProcessor PowerShell Script; EventLog CmdLets; Retrieving More Specific Eventlog Information; Creating the Script; Step One: Define the Challenge; Step Two: Create the Script in Stages; Script Header; .Synopsis Section; .Description Section; .Parameters Section; .Examples Section; Parameter Definition; Local Variable Definition; CmdLet Pipeline Execution; EventProcessor Get-Help Result; EventProcessor Script Execution; Resulting Directory; HTML Output Report; Remote Access 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Scripting languages (Computer science) 
650 0 |a Windows PowerShell (Computer program language) 
650 0 |a Python (Computer program language) 
650 6 |a Langages de script (Informatique) 
650 6 |a Windows PowerShell (Langage de programmation) 
650 6 |a Python (Langage de programmation) 
650 7 |a Programming & scripting languages: general.  |2 bicssc 
650 7 |a Computer security.  |2 bicssc 
650 7 |a COMPUTERS  |x Programming Languages  |x General.  |2 bisacsh 
650 7 |a Python (Computer program language)  |2 fast 
650 7 |a Scripting languages (Computer science)  |2 fast 
650 7 |a Windows PowerShell (Computer program language)  |2 fast 
776 0 8 |i Print version:  |z 1484245032  |z 9781484245033  |w (OCoLC)1085970995 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484245040/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36190931 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5742868 
938 |a EBSCOhost  |b EBSC  |n 2093389 
938 |a YBP Library Services  |b YANK  |n 16138165 
994 |a 92  |b IZTAP