Cargando…

Investigating Windows Systems.

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Inves...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Carvey, Harlan A. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London : Elsevier Ltd. : Academic Press, 2018.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; Investigating Windows Systems; Copyright Page; Contents; About the Author; Preface; Intended Audience; Book Organization; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Acknowledgments; 1 The Analysis Process; Introduction; The Analysis Process; Goals; Analysis Plan; Reporting; Lessons Learned; Modifying the Analysis Process, Based on Lessons Learned; Sharing; The Rest of This Book; 2 Finding Malware; Introduction; Finding Malware-Windows XP; Image Format; Analysis Goal; Image Survey; Constructing a Timeline; System Time Changes; Documenting the Malware; Analysis Summary
  • Analysis PointsFinding Malware-Windows 7; Analysis Goal; Image Survey; Constructing a Timeline; USB Device Analysis; Analysis Summary; Analysis Points; Final Words; 3 User Activity; Introduction; CFReDS Hacking Case Image; Analysis Goals; Analysis Plan; Timeline; Additional Data; Summary; Lessons Learned; Data Theft; Analysis Goals; Analysis Plan; Connected Devices; Data Theft; Outlook PST File; Other Data Sources; Summary; Lessons Learned; Joe's PC; Analysis Goals; Analysis Plan; Analysis; Viewing ThumbCache Database Contents; Sufficiency; Summary; Lessons Learned; 4 Web Server Compromise
  • IntroductionWindows 2008 Web Server; Analysis Goals; Analysis Plan; Data Extraction; Analysis; Web Server Logs; Findings; Summary; 5 Setting Up A Testing Environment; Introduction; Setting Up A Testing Environment; Configuration; Testing and Documentation; File System Tunneling; Deleting Files; Volume Shadow Copies; Final Words; Index; Back Cover