Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    "Windows Forensic Analysis DVD Toolkit 2E" by Harlan Carvey

    Posted By: exLib
    "Windows Forensic Analysis DVD Toolkit 2E" by Harlan Carvey

    "Windows Forensic Analysis DVD Toolkit 2E" by Harlan Carvey
    Eoghan Casey Technical Editor. Second Edition
    Sуngrеss, Еlsеviеr Inc. | 2009 | ISBN: 1597494224 9781597494229 | 507 pages | PDF/djvu | 6/8 MB

    Author has brought this book up-to-date to give you: the responder, examiner, or analyst the must-have tool kit for your job. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline when an incident occurs, but due to staffing and budget constraints do not have the necessary knowledge to respond effectively.

    PDF: ES Download • | • FSonic • | • DepositF pdf


    DJVU: ES Download • | • FSonic • | • DepositF djvu



    Windows is the largest operating system on desktops and servers worldwide, which mean more intrusions, malware infections, and cybercrime happen on these systems.

    Brief
    1 Live Response: Collecting Volatile Data
    2 Live Response: Data Analysis
    3 Windows Memory Analysis
    4 Registry Analysis
    5 File Analysis
    6 Executable File Analysis
    7 Rootkits and Rootkit Detection
    8 Tying It All Together
    Index

    Contents
    Preface
    Author's Acknowledgments
    Chapter 1 Live Response: Collecting Volatile Data
    Introduction
    Live Response
    Locard’s Exchange Principle
    Order of Volatility
    When to Perform Live Response
    What Data to Collect
    System Time
    Logged-on Users
    PsLoggedOn.
    Net Sessions
    LogonSessions
    Open Files
    Network Information (Cached NetBIOS Name Table)
    Network Connections
    Netstat
    Process Information
    Tlist
    Tasklist
    PsList
    ListDLLs
    Handle
    Process-to-Port Mapping
    Netstat
    Fport
    Tcpvcon.
    Process Memory
    Network Status
    Ipconfig
    PromiscDetect and Promqry
    Clipboard Contents
    Service/Driver Information
    Command History
    Mapped Drives
    Shares
    Nonvolatile Information
    Registry Settings
    ClearPageFileAtShutdown
    DisableLastAccess
    Autoruns.
    Event Logs.
    Devices and Other Information
    A Word about Picking Your Tools
    Live-Response Methodologies
    Local Response Methodology
    Remote Response Methodology
    The Hybrid Approach (a.k.a. Using the FSP)
    Summary
    Solutions Fast Track
    Frequently Asked Questions
    Chapter 2 Live Response: Data Analysis
    Introduction
    Data Analysis
    Example 1-3
    Agile Analysis
    Expanding the Scope
    Reaction
    Prevention
    Summary
    Solutions Fast Track
    Frequently Asked Questions.
    Chapter 3 Windows Memory Analysis
    Introduction
    A Brief History
    Collecting Process Memory
    Dumping Physical Memory
    DD.
    Nigilant32.
    ProDiscover
    KnTDD
    MDD
    Win32dd
    Memoryze
    Winen
    Fastdump
    F-Response
    Section Summary
    Alternative Approaches for Dumping Physical Memory
    Hardware Devices
    FireWire
    Crash Dumps
    Virtualization
    Hibernation File
    Analyzing a Physical Memory Dump
    Determining the Operating System of a Dump File
    Process Basics
    EProcess Structure
    Process Creation Mechanism
    Parsing Memory Dump Contents
    Lsproc.pl
    Lspd.pl
    Volatility Framework
    Memoryze
    HBGary Responder
    Parsing Process Memory
    Extracting the Process Image
    Memory Dump Analysis and the Page File
    Pool Allocations
    Summary
    Solutions Fast Track
    Frequently Asked Questions
    Chapter 4 Registry Analysis
    Introduction
    Inside the Registry.
    Registry Structure within a Hive File
    The Registry As a Log File
    Monitoring Changes to the Registry
    Registry Analysis
    RegRipper
    Rip
    RipXP
    System Information
    ComputerName
    TimeZoneInformation
    Network Interfaces
    MAC Address
    Shares
    Audit Policy and Event Logs
    Wireless SSIDs
    Autostart Locations
    System Boot
    User Login
    User Activity
    Enumerating Autostart Registry Locations
    AutoRun Functionality
    NtfsDisableLastAccessUpdate
    NukeOnDelete
    USB Removable Storage Devices
    USB Device Issues
    Mounted Devices
    Portable Devices
    Finding Users
    Tracking User Activity
    The UserAssist Keys
    MUICache
    MRU Lists
    Search Assistant
    Connecting to Other Systems
    CD Burning
    IM and P2P
    Windows XP System Restore Points
    Redirection
    Virtualization
    Deleted Registry Keys
    Summary
    DVD Contents
    Solutions Fast Track
    Frequently Asked Questions
    Chapter 5 File Analysis
    Introduction
    Log Files
    Event Logs
    Understanding Events
    Event Log File Format
    Event Log Header
    Event Record Structure
    Vista Event Logs.
    IIS Logs
    Log Parser
    Web Browser History
    Other Log Files
    Setuplog.txt
    Setupact.log
    Setupapi.log
    Netsetup.log
    Task Scheduler Log
    XP Firewall Logs
    Mrt.log
    Dr. Watson Logs
    Cbs.log
    Crash Dump Files
    Recycle Bin
    Vista Recycle Bin
    XP System Restore Points
    Rp.log Files
    Change.log.x Files
    Vista Volume Shadow Copy Service
    Prefetch Files
    Vista SuperFetch
    Shortcut Files
    File Metadata
    Word Documents
    PDF Documents
    Image Files
    File Signature Analysis
    NTFS Alternate Data Streams
    Creating ADSes
    Enumerating ADSes
    Using ADSes
    Removing ADSes
    ADS Summary
    Alternative Methods of Analysis
    Mounting an Image
    Discovering Malware
    Timeline Analysis
    Summary
    Solutions Fast Track
    Frequently Asked Questions
    Chapter 6 Executable File Analysis
    Introduction
    Static Analysis
    Locating Files to Analyze
    Documenting the File.
    Analysis
    The PE Header
    IMPORT Tables
    EXPORT Table
    Resources
    Obfuscation
    Binders
    Packers
    Cryptors
    Dynamic Analysis
    Testing Environment
    Virtualization
    Throwaway Systems
    Tools
    Process
    Summary
    Solutions Fast Track
    Frequently Asked Questions
    Chapter 7 Rootkits and Rootkit Detection
    Introduction
    Rootkits
    Rootkit Detection
    Live Detection
    RootkitRevealer
    GMER
    Helios
    MS Strider GhostBuster
    ProDiscover
    F-Secure BlackLight
    Sophos Anti-Rootkit
    AntiRootkit.com
    Postmortem Detection
    Prevention
    Summary
    Solutions Fast Track
    Frequently Asked Questions
    Chapter 8 Tying It All Together
    Introduction
    Case Studies.
    Case Study 1: The Document Trail
    Case Study 2: Intrusion.
    Case Study 3: DFRWS 2008 Forensic Rodeo
    Case Study 4: Copying Files
    Case Study 5: Network Information
    Case Study 6: SQL Injection
    Case Study 7: The App Did It
    Getting Started
    Documentation
    Goals
    Checklists
    Now What?
    Extending Timeline Analysis
    Summary
    Solutions Fast Track
    Frequently Asked Questions
    Chapter 9 Performing Analysis on a Budget
    Introduction
    Documenting Your Analysis
    Tools
    Acquiring Images
    dd
    FTK Imager
    Image Analysis
    The SleuthKit
    PyFlag
    ProDiscover Basic
    Mounting an Image File
    File Analysis
    Hashing Utilities
    Hex Editors
    Network Tools
    Scanning
    Packet Capture and Analysis
    Search Utilities
    Summary
    Solutions Fast Track
    Frequently Asked Questions
    Index
    with TOC BookMarkLinks

    "Windows Forensic Analysis DVD Toolkit 2E" by Harlan Carvey