Title | Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems |
---|---|
File Size | 5.4 MB |
Total Pages | 145 |
Title page Table of Contents Dedication Copyright Introduction How to Use This book Investigative Approach Forensic Analysis in Malware Investigations Applying Forensics to Malware From Malware Analysis to Malware Forensics Chapter 1. Linux Malware Incident Response Introduction Volatile Data Collection Methodology Nonvolatile Data Collection from a Live Linux System Conclusion Appendix 1 Incident Response Tool Suites Remote Collection Tools Volatile Data Collection and Analysis Tools Collecting Subject System Details Identifying Users Logged into the System Network Connections and Activity Process Analysis Loaded Modules Opened Files Command History Appendix 2 Live Response: Field Notes Appendix 3 Live Response: Field Interview Questions Appendix 4 Pitfalls to Avoid Selected Readings