Windows Forensic Analysis Toolkit
Advanced Analysis Techniques for Windows 8
- 4th Edition - March 11, 2014
- Author: Harlan Carvey
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 4 1 7 1 5 7 - 2
- eBook ISBN:9 7 8 - 0 - 1 2 - 4 1 7 1 7 4 - 9
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteHarlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how.
The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7.
This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.
- Complete coverage and examples of Windows 8 systems
- Contains lessons from the field, case studies, and war stories
- Companion online toolkit material, including electronic printable checklists, cheat sheets, custom tools, and walk-throughs
Information Security professionals of all levels, digital forensic examiners and investigators, InfoSec consultants, attorneys, law enforcement officers. Also forensic training vendors, government training courses, universities, and high-tech crime associations.
- Dedication
- Preface
- Intended Audience
- Organization of This Book
- DVD Contents
- Acknowledgments
- About the Author
- About the Technical Editor
- Chapter 1. Analysis Concepts
- Introduction
- Analysis concepts
- Setting up an analysis system
- Summary
- Chapter 2. Incident Preparation
- Introduction
- Being prepared to respond
- Data collection
- Business models
- Summary
- Chapter 3. Volume Shadow Copies
- Introduction
- What are “volume shadow copies”?
- Live systems
- Acquired images
- Windows 8
- Summary
- Reference
- Chapter 4. File Analysis
- Information in This Chapter
- Introduction
- MFT
- Event logs
- Recycle bin
- Prefetch files
- Scheduled tasks
- Jump lists
- Hibernation files
- Application files
- Summary
- References
- Chapter 5. Registry Analysis
- Introduction
- Registry analysis
- Summary
- References
- Chapter 6. Malware Detection
- Information in This Chapter
- Introduction
- Malware Characteristics
- Detecting Malware
- Summary
- References
- Chapter 7. Timeline Analysis
- Introduction
- Timelines
- Creating Timelines
- Case Study
- Summary
- Chapter 8. Correlating Artifacts
- Introduction
- How-Tos
- Summary
- Chapter 9. Reporting
- Introduction
- Goals
- Case Notes
- Reporting
- Summary
- Index
- No. of pages: 350
- Language: English
- Edition: 4
- Published: March 11, 2014
- Imprint: Syngress
- Paperback ISBN: 9780124171572
- eBook ISBN: 9780124171749
HC