Document Type
|
:
|
BL
|
Record Number
|
:
|
855863
|
Main Entry
|
:
|
Skulkin, Oleg.
|
Title & Author
|
:
|
Windows Forensics Cookbook.
|
Publication Statement
|
:
|
Birmingham :: Packt Publishing,, 2017.
|
Page. NO
|
:
|
1 online resource (274 pages)
|
ISBN
|
:
|
1784391271
|
|
:
|
: 9781784391270
|
|
:
|
1784390496
|
Contents
|
:
|
Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Digital Forensics and Evidence Acquisition; Introduction; Why Windows?; Windows file system; Identifying evidence sources; Ensuring evidence is forensically sound; Writing reports; Digital forensic investigation -- an international field; What can we do to make things easier for ourselves in the meantime?; Challenges of acquiring digital evidence from Windows systems; Chapter 2: Windows Memory Acquisition and Analysis; Introduction.
|
|
:
|
Drive acquisition in E01 format with FTK ImagerGetting ready; How to do it ... ; How it works ... ; See more; Drive acquisition in RAW format with dc3dd; Getting ready; How to do it ... ; How it works ... ; See also; Mounting forensic images with Arsenal Image Mounter; Getting ready; How to do it ... ; How it works ... ; See also; Chapter 4: Windows File System Analysis; Introduction; NTFS Analysis with The Sleuth Kit; Getting ready; How to do it ... ; How it works ... ; See also; Undeleting files from NTFS with Autopsy; Getting ready ... ; How to do it ... ; How it works ... ; See also.
|
|
:
|
How it works ... See also; Chapter 6: Windows Registry Analysis; Introduction; Extracting and viewing Windows Registry files with Magnet AXIOM; Getting ready; How to do it ... ; How it works ... ; See also; Parsing registry files with RegRipper; Getting ready; How to do it ... ; How it works ... ; See also; Recovering deleted Registry artifacts with Registry Explorer; Getting ready; How to do it ... ; How it works ... ; See also; Registry analysis with FTK Registry Viewer; Getting ready; How to do it ... ; How it works ... ; See also; Chapter 7: Main Windows Operating System Artifacts; Introduction.
|
|
:
|
Undeleting files from ReFS with ReclaiMe File RecoveryGetting ready; How to do it ... ; How it works ... ; See also; File carving with PhotoRec; Getting ready; How to do it ... ; How it works ... ; See more; Chapter 5: Windows Shadow Copies Analysis; Introduction; Browsing and copying files from VSCs on a live system with ShadowCopyView; Getting ready; How to do it ... ; How it works ... ; See also; Mounting VSCs from disk images with VSSADMIN and MKLINK; Getting ready; How to do it ... ; How it works ... ; See also; Processing and analyzing VSC data with Magnet AXIOM; Getting ready; How to do it ...
|
|
:
|
Windows memory acquisition with Belkasoft RAM CapturerGetting ready; How to do it ... ; How it works ... ; See also; Windows memory acquisition with DumpIt; Getting ready; How to do it ... ; How it works ... ; See also; Windows memory image analysis with Belkasoft Evidence Center; Getting ready; How to do it ... ; How it works ... ; See also; Windows memory image analysis with Volatility; Getting ready; How to do it ... ; How it works ... ; See also; Variations in Windows versions; Getting ready; How to do it ... ; There is more ... ; Chapter 3: Windows Drive Acquisition; Introduction.
|
Abstract
|
:
|
Maximize the power of Windows Forensics to perform highly effective forensic investigationsAbout This Book* Prepare and perform investigations using powerful tools for Windows, * Collect and validate evidence from suspects and computers and uncover clues that are otherwise difficult* Packed with powerful recipes to perform highly effective field investigationsWho This Book Is ForIf you are a forensic analyst or incident response professional who wants to perform computer forensics investigations for the Windows platform and expand your took kit, then this book is for you. What You Will Learn* Understand the challenges of acquiring evidence from Windows systems and overcome them* Acquire and analyze Windows memory and drive data with modern forensic tools.* Extract and analyze data from Windows file systems, shadow copies and the registry* Understand the main Windows system artifacts and learn how to parse data from them using forensic tools* See a forensic analysis of common web browsers, mailboxes, and instant messenger services* Discover how Windows 10 differs from previous versions and how to overcome the specific challenges it presents* Create a graphical timeline and visualize data, which can then be incorporated into the final report* Troubleshoot issues that arise while performing Windows forensicsIn DetailWindows Forensics Cookbook provides recipes to overcome forensic challenges and helps you carry out effective investigations easily on a Windows platform. You will begin with a refresher on digital forensics and evidence acquisition, which will help you to understand the challenges faced while acquiring evidence from Windows systems. Next you will learn to acquire Windows memory data and analyze Windows systems with modern forensic tools. We also cover some more in-depth elements of forensic analysis, such as how to analyze data from Windows system artifacts, parse data from the most commonly-used web browsers and email services, and effectively report on digital forensic investigations. You will see how Windows 10 is different from previous versions and how you can overcome the specific challenges it brings. Finally, you will learn to troubleshoot issues that arise while performing digital forensic investigations. By the end of the book, you will be able to carry out forensics investigations efficiently. Style and approachThis practical guide filled with hands-on, actionable recipes to detect, capture, and recover digital artifacts and deliver impeccable forensic outcomes.
|
Subject
|
:
|
Operating systems (Computers)
|
Subject
|
:
|
Operating systems (Computers)
|
Subject
|
:
|
Microsoft Windows (Computer file)
|
|
:
|
Microsoft Windows (Computer file)
|
Dewey Classification
|
:
|
005.446
|
LC Classification
|
:
|
T55.4-60.8
|