Cargando…

Practical Memory Forensics : Jumpstart Effective Forensic Analysis of Volatile Memory.

A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques Key Features Explore memory forensics, one of the vital branches of digital investigation Learn the art of user activities reconstruction and malware detection using volatile memory Get acquainte...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Ostrovskaya, Svetlana (Autor), Skulkin, Oleg (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2022.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1299382491
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 220226s2022 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d ORMDA  |d OCLCO  |d OCLCF  |d UKAHL  |d NLW  |d OCLCQ  |d N$T  |d OCLCQ  |d IEEEE  |d OCLCO 
019 |a 1298393212 
020 |a 1801079544 
020 |a 9781801079549  |q (electronic bk.) 
029 1 |a AU@  |b 000071520480 
035 |a (OCoLC)1299382491  |z (OCoLC)1298393212 
037 |a 9781801070331  |b O'Reilly Media 
037 |a 10163456  |b IEEE 
050 4 |a QA76.76.C68  |b M35 2020 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Ostrovskaya, Svetlana,  |e author. 
245 1 0 |a Practical Memory Forensics :  |b Jumpstart Effective Forensic Analysis of Volatile Memory. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2022. 
300 |a 1 online resource (304 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques Key Features Explore memory forensics, one of the vital branches of digital investigation Learn the art of user activities reconstruction and malware detection using volatile memory Get acquainted with a range of open-source tools and techniques for memory forensics Book Description Memory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis. With memory forensics, you can not only gain key insights into the user's context but also look for unique traces of malware, in some cases, to piece together the puzzle of a sophisticated targeted attack. Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. This book takes a practical approach and uses memory images from real incidents to help you gain a better understanding of the subject and develop the skills required to investigate and respond to malware-related incidents and complex targeted attacks. You'll cover Windows, Linux, and macOS internals and explore techniques and tools to detect, investigate, and hunt threats using memory forensics. Equipped with this knowledge, you'll be able to create and analyze memory dumps on your own, examine user activity, detect traces of fileless and memory-based malware, and reconstruct the actions taken by threat actors. By the end of this book, you'll be well-versed in memory forensics and have gained hands-on experience of using various tools associated with it. What you will learn Understand the fundamental concepts of memory organization Discover how to perform a forensic investigation of random access memory Create full memory dumps as well as dumps of individual processes in Windows, Linux, and macOS Analyze hibernation files, swap files, and crash dumps Apply various methods to analyze user activities Use multiple approaches to search for traces of malicious activity Reconstruct threat actor tactics and techniques using random access memory analysis Who this book is for This book is for incident responders, digital forensic specialists, cybersecurity analysts, system administrators, malware analysts, students, and curious security professionals new to this field and interested in learning memory forensics. A basic understanding of malware and its working is expected. Although not mandatory, knowledge of operating systems internals will be helpful. For those new to this field, the book covers all the necessary concepts. 
505 0 |a Table of Contents Why Memory Forensics? Acquisition Process Windows Memory Acquisition Reconstructing User Activity with Windows Memory Forensics Malware Detection and Analysis with Windows Memory Forensics Alternative Sources of Volatile Memory Linux Memory Acquisition User Activity Reconstruction Malicious Activity Detection MacOS Memory Acquisition Malware Detection and Analysis with macOS Memory Forensics. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Malware (Computer software) 
650 0 |a Computer security. 
650 0 |a Computer networks. 
650 0 |a Application software. 
650 2 |a Computer Security 
650 2 |a Computer Communication Networks 
650 6 |a Logiciels malveillants. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs. 
650 6 |a Logiciels d'application. 
650 7 |a COMPUTERS  |x Security  |x Viruses & Malware.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Application software  |2 fast 
650 7 |a Computer networks  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
700 1 |a Skulkin, Oleg,  |e author. 
776 0 8 |i Print version:  |a Ostrovskaya, Svetlana.  |t Practical Memory Forensics.  |d Birmingham : Packt Publishing, Limited, ©2022 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781801070331/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH39710985 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6885984 
938 |a EBSCOhost  |b EBSC  |n 3174153 
994 |a 92  |b IZTAP