Digital Forensics with Kali Linux : perform data acquisition, data recovery, Network Forensics, and Malware Analysis with Kali Linux /: perform data acquisition, data recovery, Network Forensics, and Malware Analysis with Kali Linux. (2020)
- Record Type:
- Book
- Title:
- Digital Forensics with Kali Linux : perform data acquisition, data recovery, Network Forensics, and Malware Analysis with Kali Linux /: perform data acquisition, data recovery, Network Forensics, and Malware Analysis with Kali Linux. (2020)
- Main Title:
- Digital Forensics with Kali Linux : perform data acquisition, data recovery, Network Forensics, and Malware Analysis with Kali Linux
- Further Information:
- Note: Shiva V. N. Parasram.
- Authors:
- Parasram, Shiva V. N
- Contents:
- Cover -- Title page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux -- Not Just for Penetration Testing -- Chapter 1: Introduction to Digital Forensics -- What is digital forensics? -- Digital forensics methodology -- A brief history of digital forensics -- The need for digital forensics as technology advances -- Operating systems and open source tools for digital forensics -- Digital Evidence and Forensics Toolkit (DEFT) Linux -- CAINE -- Kali Linux -- The need for multiple forensics tools in digital investigations Commercial forensics tools -- Belkasoft Evidence Center (EC) 2020 -- AccessData Forensic Toolkit (FTK) -- EnCase Forensic -- Anti-forensics -- threats to digital forensics -- Encryption -- Online and offline anonymity -- Summary -- Further reading -- Chapter 2: Installing Kali Linux -- Software version -- Downloading Kali Linux -- Installing Kali Linux -- Installing Kali Linux in VirtualBox -- Preparing the Kali Linux virtual machine -- Installing Kali Linux on the virtual machine -- Creating a bootable Kali Linux portable drive -- Exploring Kali Linux -- Summary Section 2: Forensic Fundamentals and Best Practices -- Chapter 3: Understanding Filesystems and Storage Media -- The history of storage media -- IBM and the history of storage media -- Removable storage media -- Hard disk drives -- Filesystems and operating systems -- What about the data? -- Data states -- Metadata -- Slack space -- DataCover -- Title page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux -- Not Just for Penetration Testing -- Chapter 1: Introduction to Digital Forensics -- What is digital forensics? -- Digital forensics methodology -- A brief history of digital forensics -- The need for digital forensics as technology advances -- Operating systems and open source tools for digital forensics -- Digital Evidence and Forensics Toolkit (DEFT) Linux -- CAINE -- Kali Linux -- The need for multiple forensics tools in digital investigations Commercial forensics tools -- Belkasoft Evidence Center (EC) 2020 -- AccessData Forensic Toolkit (FTK) -- EnCase Forensic -- Anti-forensics -- threats to digital forensics -- Encryption -- Online and offline anonymity -- Summary -- Further reading -- Chapter 2: Installing Kali Linux -- Software version -- Downloading Kali Linux -- Installing Kali Linux -- Installing Kali Linux in VirtualBox -- Preparing the Kali Linux virtual machine -- Installing Kali Linux on the virtual machine -- Creating a bootable Kali Linux portable drive -- Exploring Kali Linux -- Summary Section 2: Forensic Fundamentals and Best Practices -- Chapter 3: Understanding Filesystems and Storage Media -- The history of storage media -- IBM and the history of storage media -- Removable storage media -- Hard disk drives -- Filesystems and operating systems -- What about the data? -- Data states -- Metadata -- Slack space -- Data volatility -- The paging file and its importance in digital forensics -- Summary -- Chapter 4: Incident Response and Data Acquisition -- Digital evidence acquisition and procedures -- Incident response and first responders Documentation and evidence collection -- Physical evidence collection and preservation -- Physical acquisition tools -- Order of volatility -- Chain of custody -- Live acquisition versus post-mortem acquisition -- Powered-on devices -- Powered-off devices -- Write blocking -- Data imaging and hashing -- Message Digest hash -- Secure Hashing Algorithm (SHA) -- Device and data acquisition guidelines and best practices -- Summary -- Section 3: Forensic Tools in Kali Linux -- Chapter 5: Evidence Acquisition and Preservation with dc3dd and Guymager -- Drive and partition recognition in Linux Device identification using the fdisk command -- Maintaining evidence integrity -- Using dc3dd in Kali Linux -- File-splitting using dc3dd -- Erasing a drive using dc3dd -- Image acquisition using DD -- Image acquisition using Guymager -- Running Guymager -- Acquiring evidence with Guymager -- Windows memory acquisition -- FTK Imager -- RAM acquisition with FTK Imager -- Belkasoft RAM Capturer -- Summary -- Chapter 6: File Recovery and Data Carving with foremost, Scalpel, and bulk_extractor -- Forensic test images used in Foremost and Scalpel -- Using Foremost for file recovery and data carving … (more)
- Edition:
- Second edition
- Publisher Details:
- Birmingham : Packt Publishing, Limited
- Publication Date:
- 2020
- Extent:
- 1 online resource (334 pages), color illustrations
- Subjects:
- 005.8
Computer crimes -- Investigation
Computer networks -- Security measures
Penetration testing (Computer security)
Electronic books - Languages:
- English
- ISBNs:
- 9781838644109
1838644105 - Notes:
- Note: Description based on online resource; title from digital title page (viewed on May 20, 2020).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.503477
- Ingest File:
- 03_075.xml