Autres vendeurs sur Amazon
+ EUR 0,01 (livraison)
Digital Forensics with Open Source Tools (Anglais) Broché – 14 avril 2011
|Neuf à partir de||Occasion à partir de|
Les clients ayant acheté cet article ont également acheté
Description du produit
Revue de presse
"This is highly detailed material. Although the introductory chapter adopts an easy pace, with overviews of important technical concepts, most of the other chapters get right down to the practice of forensic analysis. This is not a book you’re going to want to read in bed: you’ll want this right next to a computer – preferably two or three computers running different operating systems – so that you can try the techniques for yourself as you work your way through. The authors admit that this book does not cover everything you need to know. For instance, it focuses entirely on ‘dead drive’ forensics – offline systems. Analysing running systems often requires high-level proprietary tools. But it does give an excellent grounding in the methods of digital forensic analysis and provides a valuable first step in learning the technicalities."--Network Security, May 2012, page 4
"Digital Forensics – MacGyver Style! The practical solutions of this book, Digital Forensics with Open Source Tools, save the day when commercial tools fail. During an incident, the clock ticks. Response teams scramble to pull anything together to solve the immediate challenge. Cory Altheide and Harlan Carvey take you through the tools and tactics that you need – the ones that in a pinch will get the job done. A welcome addition to my library."--Rob Lee, SANS Institute
"Intended for students and new computer professionals, or those new to open source applications, this guide to digital forensics provides practical instructions for many common tasks in data recovery and analysis using open source tools. Beginning with a discussion of setting up an open source examination platform and tool set, the work covers disk and file system analysis, Windows, GNU/Linux and Mac OS X systems and artifacts, Internet artifacts, file analysis and automated analysis. The volume includes numerous code examples and tips and tricks as well as an appendix of software tools."--Reference and Research Book News
"Intended for students and new computer professionals, or those new to open source applications, this guide to digital forensics provides practical instructions for many common tasks in data recovery and analysis using open source tools. Beginning with a discussion of setting up an open source examination platform and tool set, the work covers disk and file system analysis, Windows, GNU/Linux and Mac OS X systems and artifacts, Internet artifacts, file analysis and automated analysis. The volume includes numerous code examples and tips and tricks as well as an appendix of software tools. Chapter examples assume a basic knowledge of the Linux command line interface."--Reference and Research Book News
"The authors intended this book for two types of readers: complete novices in the world of digital forensics, and seasoned practitioners who are interested in learning more about open source tools that could help them in their work. And although it might seem difficult to merge the knowledge in such a way to make for an interesting book for both groups, in my opinion, the writers managed to do it beautifully."--Net-Security.org
Présentation de l'éditeur
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer forensics. Both well-known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts.
Written by world-renowned forensic practitioners, this book uses the most current examination and analysis techniques in the field. It consists of 9 chapters that cover a range of topics such as the open source examination platform; disk and file system analysis; Windows systems and artifacts; Linux systems and artifacts; Mac OS X systems and artifacts; Internet artifacts; and automating analysis and extending capabilities. The book lends itself to use by students and those entering the field who do not have means to purchase new tools for different investigations.
This book will appeal to forensic practitioners from areas including incident response teams and computer forensic investigators; forensic technicians from legal, audit, and consulting firms; and law enforcement agencies.
- Written by world-renowned forensic practitioners
- Details core concepts and techniques of forensic file system analysis
- Covers analysis of artifacts from the Windows, Mac, and Linux operating systems
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Si vous vendez ce produit, souhaitez-vous suggérer des mises à jour par l'intermédiaire du support vendeur ?
|5 étoiles (0%)|
|4 étoiles (0%)|
|3 étoiles (0%)|
|2 étoiles (0%)|
|1 étoile (0%)|
Commentaires client les plus utiles sur Amazon.com
1. As Cory and Harlan state in the introduction to Chapter 2, "Being able to build software properly is critical for an examiner using open source tools". Speaking as a seasoned examiner that consistently leverages the majority of the tools in DFWOST, we sometimes forget that the configuration of various interpreters (Perl, Python, Ruby) and the proper installation of tools from source are a difficult task for those new to open source tools. This technical hurdle often inhibits the adoption of open source utilities by even senior analysts. I believe Cory and Harlan had this hurdle in mind when authoring DFWOST, as they provide their readers with valuable information regarding these tasks. Chapter 2 does an excellent job of stepping the reader through the installation of various interpreters and utilities for both the Linux and Windows environments. Before I read DFWOST, I was curious if Cory and Harlan would leverage an available Linux-based live distro and bypass the topic of installation and configuration of an examination system all together. I was happy to see they they did not take this route, as dependency on a live distro can simply add a layer of abstraction for a new student.
2. Instead of bloating DFWOST with content that has been covered in depth in existing publications, Cory and Harlan opt to simply direct readers to these resources. Given both the author's resumes (and previous publications), they could of easily supplied this information in DFWOST to unnecessarily bulk this book up. For instance, when the topic of advanced Windows Registry analysis is mentioned, the reader is directed to Harlan's Windows Registry Forensics. This may be construed as self-serving, but the same is done when the topic of Windows binary (PE) analysis is entered. In this case, the reader is directed towards Malware Analyst's Cookbook by Ligh, Adiar, Hartstein, and Richard. In my opinion, both these publications are the definitive sources for their perspective topics. It is refreshing to see the authors direct their readers to the appropriate place, instead of diving into a topic that probably doesn't have the appropriate real estate dedicated for discussion in the first place.
As with any material these two authors provide to the community, DFWOST should be required reading for any examiner - not just open source hobbyists and newbies. I hope we see another great publication from both Cory and Harlan in the near future. They make a good team.
I teach digital forensic classes at the grad school level and also at a non-profit; in both classes to students of a wide range of skills I always recommend this book as a must read. It has something for everyone.
The author does not make the assumption that everyone reading the book will be familiar with what Open Source Software is and goes in to a little bit of detail on the subject. As a FOSS advocate I was appreciative of the effort put in to educate others on this subject.
This chapter is about getting your forensic computer setup with FOSS tools and applications. It covers setups on Linux and Windows, but with a preference towards Ubuntu (Linux) as this is what the author used and what the examples are done with.
Covers the basics of how to analyze disks. This includes covering ram slack, file slack, file systems specifics, carving and hashing. It is important to know how to handle evidence if will be needed in a court room. Failure to use hashes and load a disk as read only will likely result in evidence being questioned and potentially thrown out.
Covers Windows specific file systems artifacts
Covers Linux specific file systems artifacts
Covers OS specific file system artifacts
Covers browser artifacts for IE, Firefox, Chrome and Safari. It also covers email artifacts. I was particularly interested by the Chrome and Safari artifacts.
Deals with file analysis covering media files, documents and others. It was interesting to note that there does not appear to be any ability for Open Source tools to leverage known hashes to identify files known to law enforcement.
Automating the process -- trust me you do not want to have to do everything by hand.
Covered free, but not open source tools that are available.
Overall I found the book to have a solid mix of theory and tool use examples. It also included links to forensic images you can use to experiment with the tools. I already played with many of these images with proprietary tools a while back and look forward to exploring how open source tools work with them as well.
Solid book diminished only by the inept packaging Amazon utilized. If the book were not so good I would be returning the book.
A lot of work has been put in that book. You definitely feel the sweat of the author putting all information together, the testing, the results.
If you start in Digital Forensics it might be slightly complex but it can easily be your second or third book in that matter.
If you're already an IT engineer or passionate and you want to explore the deep technical bit of digital forensics then go for it. It's a treasure of information.
Do prefer the paperback version because you will love putting annotation and highlighting some lines to keep them in mind and for further usage. I have the Kindle edition but I consider buying the paperback as well just to keep it under my arm on my desk.