Malware forensic field guide for linux system : digital forensic field guide / Malin H. Cameron, Eogham Casey, James M. Aquillina.

By: Malin, Cameron. H
Contributor(s): Casey, Eoghan | Aquillina, James M | Rose, Curtis W [Technical editor]
Material type: TextTextPublisher: Amsterdam: Elsevier, c2014Description: xxxix, 574 p. ill. 23 cmISBN: 9781597494700Subject(s): Malware Forensic | Linux systemsDDC classification: 005.8
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Copy number Status Date due Barcode
Book Closed Access Book Closed Access Engineering Library
005.8 MAL 1 (Browse shelf) 1 Available 0027613

Contents
1. Malware incident response
Nonvolatile Data collection from a live linux system
Conclusion

2. Linux memory forensic
Introduction
Interpreting various data structures in Linux memory
Dumping Linux process memory
Dissecting Linux process memory
Conclusion

3. Postmortem forensics
Introduction
Examining Linux file system
Examining application traces
Key word searching
Forensics reconstruction of compromised Linux systems
etc

4. Legal considerations
Framing the issues
General considerations
Source of investigative authority
Statutory limits on Authority
Tools for acquiring data
etc

5. File identification and profiling
Introduction
File similarity indexing
Symbolic and debug information
Embedded file Metadata
File Obfuscation:Packing and encryption identification
etc

6. Analysis of a Malware specimen
Introduction
Pre-execution preparation: system and network monitoring
Execution Artifact Capture: Digital impression and trace evidence
Executing the malicious code specimen
Automated Malware analysis framework
Interacting with and manipulating the Malware specimen
etc


Includes Index

There are no comments for this item.

to post a comment.


© Busitema University, 2022. All rights reserved.