
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
UNIX and Linux Forensic Analysis DVD Toolkit
About this book
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker.The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware.Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else.- This book contains information about UNIX forensic analysis that is not available anywhere else. Much of the information is a result of the author's own unique research and work.- The authors have the combined experience of law enforcement, military, and corporate forensics. This unique perspective makes this book attractive to all forensic investigators.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Chapter 1. Introduction
Solutions in this chapter:
- History
- Target Audience
- What is Covered
- What is Not Covered
History
Target Audience
What is Covered
- Linux distributions
- Booting a Linux system
- The shell
- Disks and devices in Linux
- File system organization and paths
- File system formats
- Logs
- Daemons
- Connecting to the target machine
- Locating the external hard drive to which you will transfer the image
- Mounting the external hard drive to which you will transfer the image
- Gathering volatile information
- Creating a forensic image with the “dd” command
- Verifying your information using Message Digest 5 (MD5)
- Maintaining your data in a forensically sound manner
- Who is logged onto the system
- Which processes are running
- Which ports are open, and where they are communicating to or receiving communication from
- Open file handlers
- Open Transmission Control Protocol (TCP) hooks
- Keyword searches
- nmap
- nessus
- netcat
- nikto
- Kismet
- wireshark
- metasploit
- paros
- hping2
- ettercap
- Disk and partition information
- Kernel symbols
- A copy of physical memory
- All kernel modules
- A plethora of information on running processes
- System and security configuration files
- Init and Run Control scripts
- Cron jobs
- Hidden files and hiding places
- Identifying other files of investigative interest
- Viruses
- Worms
- Trojan Horses
- Flooders
What is Not Covered
Table of contents
- Copyright
- Disclaimer
- Brief Table of Contents
- Table of Contents
- List of Figures
- List of Tables
- Co-Authors
- Appendix Contributor
- Chapter 1. Introduction
- Chapter 2. Understanding Unix
- Chapter 3. Live Response
- Chapter 4. Initial Triage and Live Response
- Chapter 5. The Hacking Top 10
- Chapter 6. The /Proc File System
- Chapter 7. File Analysis
- Chapter 8. Malware
- Appendix A. Implementing Cybercrime Detection Techniques on Windows and *nix
- Index