Cargando…

Digital Forensics with Kali Linux Enhance Your Investigation Skills by Performing Network and Memory Forensics with Kali Linux 2022. x.

Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools. This new edition will help you e...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Parasram, Shiva V. N.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credit
  • Dedicated
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Blue and Purple Teaming Fundamentals
  • Chapter 1: Red, Blue, and Purple Teaming Fundamentals
  • How I got started with Kali Linux
  • What is Kali Linux?
  • Why is Kali Linux so popular?
  • Understanding red teaming
  • Understanding blue teaming
  • Understanding purple teaming
  • Summary
  • Chapter 2: Introduction to Digital Forensics
  • What is digital forensics?
  • The need for blue and purple teams
  • Digital forensics methodologies and frameworks
  • DFIR frameworks
  • Comparison of digital forensics operating systems
  • Digital evidence and forensics toolkit Linux
  • Computer Aided INvestigative Environment (CAINE)
  • CSI Linux
  • Kali Linux
  • The need for multiple forensics tools in digital investigations
  • Commercial forensics tools
  • Anti-forensics
  • threats to digital forensics
  • Summary
  • Chapter 3: Installing Kali Linux
  • Technical requirements
  • Downloading Kali Linux
  • Downloading the required tools and images
  • Downloading the Kali Linux Everything torrent
  • Installing Kali Linux on portable storage media for live DFIR
  • Installing Kali as a standalone operating system
  • Installing Kali in VirtualBox
  • Preparing the Kali Linux VM
  • Installing Kali Linux on the virtual machine
  • Installing and configuring Kali Linux as a virtual machine or as a standalone OS
  • Summary
  • Chapter 4: Additional Kali Installations and Post-Installation Tasks
  • Installing a pre-configured version of Kali Linux in VirtualBox
  • Installing Kali Linux on Raspberry Pi4
  • Updating Kali
  • Enabling the root user account in Kali
  • Adding the Kali Linux forensics metapackage
  • Summary
  • Chapter 5: Installing WINE in Kali Linux
  • What WINE is and the advantages of using it in Kali Linux
  • Installing WINE
  • Configuring our WINE installation
  • Testing our WINE installation
  • Summary
  • Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices
  • Chapter 6: Understanding File Systems and Storage
  • History and types of storage media
  • IBM and the history of storage media
  • Removable storage media
  • Magnetic tape drives
  • Floppy disks
  • Optical storage media
  • Blu-ray Disc
  • Flash storage media
  • USB ash drives
  • Flash memory cards
  • Hard disk drives
  • Integrated Drive Electronics HDDs
  • Serial Advanced Technology Attachment HDDs
  • Solid-state drives
  • File systems and operating systems
  • Microsoft Windows
  • Macintosh (macOS)
  • Linux
  • Data types and states
  • Metadata
  • Slack space
  • Volatile and non-volatile data and the order of volatility
  • The importance of RAM, the paging file, and cache in DFIR
  • Summary
  • Chapter 7: Incident Response, Data Acquisitions, and DFIR Frameworks
  • Evidence acquisition procedures
  • Incident response and first responders
  • Evidence collection and documentation
  • Physical acquisition tools
  • Live versus post-mortem acquisition