Malware Forensics Field Guide for Linux Systems
Digital Forensics Field GuidesBy
- Cameron Malin, Special Agent with the Federal Bureau of Investigation.
- Eoghan Casey, BS, MA, Eoghan Casey, cmdLabs, Baltimore, MD, USA
- James Aquilina, Managing Director and Deputy General Counsel of Stroz Friedberg, LLC
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Computer forensic investigators, analysts, and specialists
Paperback, 624 Pages
Published: November 2013
Chapter 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System
Chapter 2. Analyzing Physical and Process Memory Dumps for Malware Artifacts
Chapter 3. Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems
Chapter 4. Legal Considerations
Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Linux System
Chapter 6. Analysis of a Suspect Program
Appendix A: Tool Glossary