Malware forensic field guide for linux system : digital forensic field guide / Malin H. Cameron, Eogham Casey, James M. Aquillina.

By: Malin, Cameron. H
Contributor(s): Casey, Eoghan | Aquillina, James M | Rose, Curtis W [Technical editor]
Material type: TextTextPublisher: Amsterdam: Elsevier, c2014Description: xxxix, 574 p. ill. 23 cmISBN: 9781597494700Subject(s): Malware Forensic | Linux systemsDDC classification: 005.8
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Copy number Status Date due Barcode
Book Closed Access Book Closed Access Engineering Library
005.8 MAL 1 (Browse shelf) 1 Available 0027613

1. Malware incident response
Nonvolatile Data collection from a live linux system

2. Linux memory forensic
Interpreting various data structures in Linux memory
Dumping Linux process memory
Dissecting Linux process memory

3. Postmortem forensics
Examining Linux file system
Examining application traces
Key word searching
Forensics reconstruction of compromised Linux systems

4. Legal considerations
Framing the issues
General considerations
Source of investigative authority
Statutory limits on Authority
Tools for acquiring data

5. File identification and profiling
File similarity indexing
Symbolic and debug information
Embedded file Metadata
File Obfuscation:Packing and encryption identification

6. Analysis of a Malware specimen
Pre-execution preparation: system and network monitoring
Execution Artifact Capture: Digital impression and trace evidence
Executing the malicious code specimen
Automated Malware analysis framework
Interacting with and manipulating the Malware specimen

Includes Index

There are no comments for this item.

to post a comment.

© Busitema University, 2022. All rights reserved.