Investigating Windows Systems

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Inves...

Full description

Bibliographic Details
Main Author: Carvey, Harlan A.
Format: eBook
Language:English
Published: London Elsevier Ltd. 2018
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Analysis PointsFinding Malware-Windows 7; Analysis Goal; Image Survey; Constructing a Timeline; USB Device Analysis; Analysis Summary; Analysis Points; Final Words; 3 User Activity; Introduction; CFReDS Hacking Case Image; Analysis Goals; Analysis Plan; Timeline; Additional Data; Summary; Lessons Learned; Data Theft; Analysis Goals; Analysis Plan; Connected Devices; Data Theft; Outlook PST File; Other Data Sources; Summary; Lessons Learned; Joe's PC; Analysis Goals; Analysis Plan; Analysis; Viewing ThumbCache Database Contents; Sufficiency; Summary; Lessons Learned; 4 Web Server Compromise
  • IntroductionWindows 2008 Web Server; Analysis Goals; Analysis Plan; Data Extraction; Analysis; Web Server Logs; Findings; Summary; 5 Setting Up A Testing Environment; Introduction; Setting Up A Testing Environment; Configuration; Testing and Documentation; File System Tunneling; Deleting Files; Volume Shadow Copies; Final Words; Index; Back Cover
  • Front Cover; Investigating Windows Systems; Copyright Page; Contents; About the Author; Preface; Intended Audience; Book Organization; Chapter 1; Chapter 2; Chapter 3; Chapter 4; Chapter 5; Acknowledgments; 1 The Analysis Process; Introduction; The Analysis Process; Goals; Analysis Plan; Reporting; Lessons Learned; Modifying the Analysis Process, Based on Lessons Learned; Sharing; The Rest of This Book; 2 Finding Malware; Introduction; Finding Malware-Windows XP; Image Format; Analysis Goal; Image Survey; Constructing a Timeline; System Time Changes; Documenting the Malware; Analysis Summary