𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Practical Linux Forensics: A Guide for Digital Investigators

✍ Scribed by Bruce Nikkel


Publisher
No Starch Press
Year
2021
Tongue
English
Leaves
357
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.

Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You\x27ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.

Learn how to:

- Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption
- Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications
- Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login
- Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes
- Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros
- Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system
- Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts
- Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings
- Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity

✦ Table of Contents


Introduction
Chapter 1: Digital Forensics Overview
Chapter 2: Linux Overview
Chapter 3: Extracting Evidence from Storage Devices and Filesystems
Chapter 4: Directory Layout and Forensic Analysis of Linux Files
Chapter 5: Investigating Evidence from Linux Logs
Chapter 6: Reconstructing System Boot and Initialization
Chapter 7: Examination of Installed Software Packages
Chapter 8: Identifying Network Configuration Artifacts
Chapter 9: Forensic Analysis of Time and Location
Chapter 10: Reconstructing User Desktops and Login Activity
Chapter 11: Forensic Traces of Attached Peripheral Devices


πŸ“œ SIMILAR VOLUMES


Practical Linux Forensics: A Guide for D
✍ Bruce Nikkel πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

<b>A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.</b> <i>Practical Linux Forensics</i> dives into the technical details of analyzing postmortem forensic images of Linux syst

Practical Linux Forensics: A Guide for D
✍ Bruce Nikkel πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

<b>A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.</b> <i>Practical Linux Forensics</i> dives into the technical details of analyzing postmortem forensic images of Linux syst

Practical Linux Forensics: A Guide for D
✍ Bruce Nikkel πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems that have been misused, abused, or the target of malicious attacks. This essential practitioner’s guide will show you how to locate and interpret digital evidence found on Linux deskto

Practical Linux Forensics: A Guide For D
✍ Bruce Nikkel πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems that have been misused, abused, or the target of malicious attacks. This essential practitioner’s guide will show you how to locate and interpret digital evidence found on Linux deskto

Practical Linux Forensics: A Guide for D
✍ Bruce Nikkel πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack. Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have be