Practical Linux Forensics

Practical Linux Forensics

$59.99

In stock
0 out of 5

$59.99

SKU: 9781718501966 Category:
Title Range Discount
Trade Discount 5 + 25%

Description

A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.

Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.

Learn how to:

  • Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption
  • Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications
  • Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login
  • Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes
  • Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros
  • Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system
  • Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts
  • Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings
  • Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity
  •  
     Introduction
    Chapter 1: Digital Forensics Overview
    Chapter 2: Linux Overview
    Chapter 3: Extracting Evidence from Storage Devices and Filesystems
    Chapter 4: Directory Layout and Forensic Analysis of Linux Files
    Chapter 5: Investigating Evidence from Linux Logs
    Chapter 6: Reconstructing System Boot and Initialization
    Chapter 7: Examination of Installed Software Packages
    Chapter 8: Identifying Network Configuration Artifacts
    Chapter 9: Forensic Analysis of Time and Location
    Chapter 10: Reconstructing User Desktops and Login Activity
    Chapter 11: Forensic Traces of Attached Peripheral Devices
    Afterword
    Appendix A:
    File and Directory List for Digital Investigators“Practical Linux Forensics is an excellent resource suitable for those new to Linux, as well as for experienced users. Whether you are an investigator, administrator, developer, or curious student, you will gain imperative knowledge that can easily be applied to your own field and endeavors.”
    —Techtyte, Cybersecurity Researcher and Advanced Reviewer

    “Thorough . . . Even if this is your first foray into computer forensics, there is a lot to be gained from Nikkel’s book.”
    —Lee Teschler, Microcontroller Tips

    “A comprehensive and informative guide . . . The author provides a wealth of information and practical tips that can be used in real-world scenarios, making it a valuable resource for both professionals and students. It is a must-read for anyone looking to gain a deeper understanding of forensic analysis on Linux systems.”
    —The Security Noob

    “After Practical Forensic Imaging, Bruce Nikkel has produced another fantastic learning resource and reference in Practical Linux Forensics. Made both for professionals more familiar with Windows or macOS forensics as well as adept Linux users looking to learn forensics, it does not need to be read linearly. Each chapter provides focused knowledge on different aspects of Linux systems in a distribution-agnostic manner. Definitely grab a copy to demystify this area of computer forensics.”
    —Daniyal S., Advanced Reviewer

    “Bruce Nikkel shares some [insight on] really uncommon and least understood areas of the Linux network stack, which will be very valuable for practitioners . . . [Practical Linux Forensics] touches on areas ignored by other resources on the subject.”
    —Arvind, Advanced ReviewerBruce Nikkel is a professor at the Bern University of Applied Sciences in Switzerland, specializing in digital forensics and cybercrime. He is co-head of the university’s research institute for cybersecurity and engineering, and director of the Masters program in Digital Forensics and Cyber Investigation. In addition to his academic work, he has worked in risk and security departments at a global financial institution since 1997. He headed the bank’s Cybercrime Intelligence & Forensic Investigation team for more than 15 years and currently works as an advisor. Bruce holds a PhD in network forensics, is the author of Practical Forensic Imaging (No Starch Press, 2016), and is an editor with Forensic Science International’s Digital Investigation journal. He has been a Unix and Linux enthusiast since the 1990s.US

    Additional information

    Weight 27.3008 oz
    Dimensions 0.9200 × 7.0600 × 9.3100 in
    Imprint

    Format

    ISBN-13

    ISBN-10

    Author

    Audience

    BISAC

    ,

    Subjects

    cybercrime, computer books, computer architecture, operating systems, cyber security books, penetration testing, hacking books, network security, computer security, penetration test, linux, logic games, COM083000, Open source, c programming, COM046070, digital forensics, linux command line, linux for beginners, linux kernel, linux administration, tech, cybersecurity, networking, technology, crypto, security, computer, engineering, games, how to, self help, computers, hackers, cryptography, reference, programming, privacy, hacking, cyber security, bash