Cargando…

Digital Forensics with Kali Linux Enhance Your Investigation Skills by Performing Network and Memory Forensics with Kali Linux 2022. x.

Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools. This new edition will help you e...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Parasram, Shiva V. N.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1373985750
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 230401s2023 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d ORMDA  |d YDX  |d N$T  |d OCLCF  |d OCLCQ  |d UPM  |d IEEEE  |d OCLCO 
019 |a 1373932104  |a 1377280512 
020 |a 9781837639656 
020 |a 1837639655 
020 |z 9781837635153 
035 |a (OCoLC)1373985750  |z (OCoLC)1373932104  |z (OCoLC)1377280512 
037 |a 9781837635153  |b O'Reilly Media 
037 |a 10251361  |b IEEE 
050 4 |a QA76.9.A25 
082 0 4 |a 364.16/8  |2 23/eng/20230425 
049 |a UAMI 
100 1 |a Parasram, Shiva V. N. 
245 1 0 |a Digital Forensics with Kali Linux  |h [electronic resource] :  |b Enhance Your Investigation Skills by Performing Network and Memory Forensics with Kali Linux 2022. x. 
250 |a 3rd ed. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2023. 
300 |a 1 online resource (414 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Blue and Purple Teaming Fundamentals -- Chapter 1: Red, Blue, and Purple Teaming Fundamentals -- How I got started with Kali Linux -- What is Kali Linux? -- Why is Kali Linux so popular? -- Understanding red teaming -- Understanding blue teaming -- Understanding purple teaming -- Summary -- Chapter 2: Introduction to Digital Forensics -- What is digital forensics? -- The need for blue and purple teams -- Digital forensics methodologies and frameworks -- DFIR frameworks 
505 8 |a Comparison of digital forensics operating systems -- Digital evidence and forensics toolkit Linux -- Computer Aided INvestigative Environment (CAINE) -- CSI Linux -- Kali Linux -- The need for multiple forensics tools in digital investigations -- Commercial forensics tools -- Anti-forensics -- threats to digital forensics -- Summary -- Chapter 3: Installing Kali Linux -- Technical requirements -- Downloading Kali Linux -- Downloading the required tools and images -- Downloading the Kali Linux Everything torrent -- Installing Kali Linux on portable storage media for live DFIR 
505 8 |a Installing Kali as a standalone operating system -- Installing Kali in VirtualBox -- Preparing the Kali Linux VM -- Installing Kali Linux on the virtual machine -- Installing and configuring Kali Linux as a virtual machine or as a standalone OS -- Summary -- Chapter 4: Additional Kali Installations and Post-Installation Tasks -- Installing a pre-configured version of Kali Linux in VirtualBox -- Installing Kali Linux on Raspberry Pi4 -- Updating Kali -- Enabling the root user account in Kali -- Adding the Kali Linux forensics metapackage -- Summary -- Chapter 5: Installing WINE in Kali Linux 
505 8 |a What WINE is and the advantages of using it in Kali Linux -- Installing WINE -- Configuring our WINE installation -- Testing our WINE installation -- Summary -- Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices -- Chapter 6: Understanding File Systems and Storage -- History and types of storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Optical storage media -- Blu-ray Disc -- Flash storage media -- USB ash drives -- Flash memory cards -- Hard disk drives -- Integrated Drive Electronics HDDs 
505 8 |a Serial Advanced Technology Attachment HDDs -- Solid-state drives -- File systems and operating systems -- Microsoft Windows -- Macintosh (macOS) -- Linux -- Data types and states -- Metadata -- Slack space -- Volatile and non-volatile data and the order of volatility -- The importance of RAM, the paging file, and cache in DFIR -- Summary -- Chapter 7: Incident Response, Data Acquisitions, and DFIR Frameworks -- Evidence acquisition procedures -- Incident response and first responders -- Evidence collection and documentation -- Physical acquisition tools -- Live versus post-mortem acquisition 
500 |a Order of volatility 
520 |a Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools. This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You'll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You'll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, memory, and operating systems. By the end of this digital forensics book, you'll have gained hands-on experience in implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation - all using Kali Linux's cutting-edge tools. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Tests d'intrusion. 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Parasram, Shiva V. N.  |t Digital Forensics with Kali Linux  |d Birmingham : Packt Publishing, Limited,c2023 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781837635153/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30448973 
938 |a YBP Library Services  |b YANK  |n 304742822 
938 |a EBSCOhost  |b EBSC  |n 3579425 
994 |a 92  |b IZTAP