• Complain

Dr. Michael Spreitzenbarth - Mastering Python Forensics

Here you can read online Dr. Michael Spreitzenbarth - Mastering Python Forensics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, publisher: Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Dr. Michael Spreitzenbarth Mastering Python Forensics

Mastering Python Forensics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Mastering Python Forensics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Master the art of digital forensics and analysis with Python About This Book Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of the various Python libraries and frameworks Analyze Python scripts to extract metadata and investigate forensic artifacts The writers, Dr. Michael Spreitzenbarth and Dr. Johann Uhrmann, have used their experience to craft this hands-on guide to using Python for forensic analysis and investigations Who This Book Is For If you are a network security professional or forensics analyst who wants to gain a deeper understanding of performing forensic analysis with Python, then this book is for you. Some Python experience would be helpful. What You Will Learn Explore the forensic analysis of different platforms such as Windows, Android, and vSphere Semi-automatically reconstruct major parts of the system activity and time-line Leverage Python ctypes for protocol decoding Examine artifacts from mobile, Skype, and browsers Discover how to utilize Python to improve the focus of your analysis Investigate in volatile memory with the help of volatility on the Android and Linux platforms In Detail Digital forensic analysis is the process of examining and extracting data digitally and examining it. Python has the combination of power, expressiveness, and ease of use that makes it an essential complementary tool to the traditional, off-the-shelf digital forensic tools. This book will teach you how to perform forensic analysis and investigations by exploring the capabilities of various Python libraries. The book starts by explaining the building blocks of the Python programming language, especially ctypes in-depth, along with how to automate typical tasks in file system analysis, common correlation tasks to discover anomalies, as well as templates for investigations. Next, well show you cryptographic algorithms that can be used during forensic investigations to check for known files or to compare suspicious files with online services such as VirusTotal or Mobile-Sandbox. Moving on, youll learn how to sniff on the network, generate and analyze network flows, and perform log correlation with the help of Python scripts and tools. Youll get to know about the concepts of virtualization and how virtualization influences IT forensics, and youll discover how to perform forensic analysis of a jailbroken/rooted mobile device that is based on iOS or Android. Finally, the book t... Read more...
Abstract: Master the art of digital forensics and analysis with Python About This Book Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of the various Python libraries and frameworks Analyze Python scripts to extract metadata and investigate forensic artifacts The writers, Dr. Michael Spreitzenbarth and Dr. Johann Uhrmann, have used their experience to craft this hands-on guide to using Python for forensic analysis and investigations Who This Book Is For If you are a network security professional or forensics analyst who wants to gain a deeper understanding of performing forensic analysis with Python, then this book is for you. Some Python experience would be helpful. What You Will Learn Explore the forensic analysis of different platforms such as Windows, Android, and vSphere Semi-automatically reconstruct major parts of the system activity and time-line Leverage Python ctypes for protocol decoding Examine artifacts from mobile, Skype, and browsers Discover how to utilize Python to improve the focus of your analysis Investigate in volatile memory with the help of volatility on the Android and Linux platforms In Detail Digital forensic analysis is the process of examining and extracting data digitally and examining it. Python has the combination of power, expressiveness, and ease of use that makes it an essential complementary tool to the traditional, off-the-shelf digital forensic tools. This book will teach you how to perform forensic analysis and investigations by exploring the capabilities of various Python libraries. The book starts by explaining the building blocks of the Python programming language, especially ctypes in-depth, along with how to automate typical tasks in file system analysis, common correlation tasks to discover anomalies, as well as templates for investigations. Next, well show you cryptographic algorithms that can be used during forensic investigations to check for known files or to compare suspicious files with online services such as VirusTotal or Mobile-Sandbox. Moving on, youll learn how to sniff on the network, generate and analyze network flows, and perform log correlation with the help of Python scripts and tools. Youll get to know about the concepts of virtualization and how virtualization influences IT forensics, and youll discover how to perform forensic analysis of a jailbroken/rooted mobile device that is based on iOS or Android. Finally, the book t

Dr. Michael Spreitzenbarth: author's other books


Who wrote Mastering Python Forensics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Mastering Python Forensics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Mastering Python Forensics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Index
A
  • Address Resolution Protocol (ARP)
    • about /
  • algorithms
    • about /
    • MD5 /
    • SHA256 /
    • SSDEEP /
  • Android
    • examining /
    • manual examination /
    • automated examination, with ADEL /
    • movement profiles, creating /
  • Android Data Extractor Lite (ADEL)
    • used, for automated examination of Android /
    • design guidelines /
    • implementation /
    • system workflow /
    • working with /
    • URL /
  • Android Software Development Kit (Android SDK)
    • about /
  • AndroTotal
    • about /
  • AppExtract
    • about /
    • URL /
  • Apple iOS
    • about /
    • keychain, obtaining from jailbroken iDevice /
    • manual examination, with libimobiledevice /
  • Application Compatibility Shim Cache
    • about /
  • atom
    • about /
    • URL /
B
  • bare-metal hypervisor
    • about /
C
  • capability flags
    • about /
  • C data types
    • about /
  • central log system
    • log information, collecting /
  • clustering, file information
    • about /
    • histograms, creating /
  • Context Triggered Piecewise Hashing (CTPH)
    • about /
  • cryptographic hash function
    • about /
    • properties /
  • ctypes
    • about /
    • Dynamic Link Libraries (DLL) /
    • C data types /
    • Unions, defining /
    • Structures, defining /
  • Cydia App Store
    • about /
D
  • Dalvik Virtual Machine (DVM)
    • about /
  • Data center as a Service (DCaaS)
    • about /
  • decoders
    • dns /
    • reservedips /
    • large-flows /
    • rip-http /
    • protocols /
    • synrst /
  • desktop virtualization
    • about /
  • direct hardware access
    • detecting /
  • Directory Table Base (DTB)
    • about /
  • directory trees
    • hash sums, creating /
  • discretionary access control
    • about /
  • disk images
    • snapshots, using as /
  • Dshell
    • using /
    • URL /
  • Dynamic Host Configuration Protocol (DHCP)
    • about /
  • Dynamic Link Libraries (DLL)
    • about /
E
  • eclipse
    • about /
  • Emerging Threats
    • URL /
  • ESXi servers
    • about /
  • Event Log (EVT)
    • about /
    • files /
    • reference link /
    • parsing, for IOC /
    • python-evtx /
    • Log2timeline /
    • plaso /
F
  • file capabilities
    • reading, with Python /
    • permitted set (p) /
    • inheritable set (i) /
    • effective set (e) /
  • file meta information
    • analyzing /
    • inode /
    • basic file metadata, reading with Python /
    • POSIX ACLs, evaluating with Python /
    • file capabilities, reading with Python /
  • file mode, inode (index node)
    • read (r) /
    • write (w) /
    • execute (x) /
    • sticky (t) /
    • set id on execution (s) /
  • Firewall
    • about /
  • forensic copy
    • investigating /
    • hash sums, creating of full disk images /
    • hash sums, creating of directory trees /
  • full disk images
    • hash sums, creating /
  • Fuzzy Hashing
    • about /
G
  • General Public License (GPL)
    • about /
  • GnuPG
    • using /
    • URL /
  • GnuPlot
    • about /
  • guest OS
    • about /
H
  • hash function
    • about /
  • hash sums
    • creating, of full disk images /
    • creating, of directory trees /
  • histograms
    • creating /
    • disadvantages /
    • advanced techniques /
  • host OS
    • about /
  • hypervisor
    • about /
I
  • inode (index node)
    • about /
    • index number /
    • file owner /
    • file group /
    • file mode /
  • Inter-Process Communication (IPC)
    • about /
  • International Mobile Subscriber Identity (IMSI)
    • about /
  • Investigative Process Model
    • for smartphones /
    • steps /
  • IOC
    • Event Log (EVT), parsing for /
    • Windows Registry, parsing for /
J
  • jailbroken iDevice
    • iOS keychain, obtaining /
K
  • kernels
    • reference link /
L
  • labenv
    • about /
  • lab environment
    • setting up /
    • Ubuntu /
    • virtualenv /
  • libimobiledevice
    • about /
    • used, for manual examination of Apple iOS /
  • LibreOffice Calc
    • about /
  • LiME
    • about /
    • using /
  • Linux Memory Extractor (LiME) format
    • about /
  • Linux specific checks
    • implementing /
    • integrity of local user credentials, checking /
    • file meta information, analyzing /
    • file information, clustering /
  • Loadable Kernel Module (LKM)
    • about /
  • local user credentials
    • integrity, checking /
  • Log2timeline
    • about /
M
  • machine learning algorithms
    • about /
  • mako kernel
    • about /
  • matplotlib module
    • about /
    • URL /
  • MD5
    • about /
  • Mobile-Sandbox
    • about /
    • URL /
  • Mobile Malware
    • about /
    • example /
N
  • National Software Reference Library (NSRL)
    • about /
    • URL /
  • Network Interfaces Card (NIC)
    • about /
  • network traffic
    • capturing /
  • nsrllookup
    • about /
    • URL /
  • NSRLquery
    • example /
    • nsrlsvr, downloading /
    • nsrlsvr, installing /
  • nsrlsvr
    • installing /
    • downloading /
    • URL /
    • installing, in non-default directory /
    • client, writing /
    • commands /
P
  • packet capture (pcap) file
    • about /
  • PhotoRec
    • about /
  • plaso
    • URL /
    • about /
  • POSIX Access Control Lists (POSIX ACLs)
    • about /
  • POSIX ACLs
    • evaluating, with Python /
  • pylibacl library
    • about /
    • URL /
  • python-evtx
    • URL /
    • about /
  • pyVmomi
    • about /
    • URL /
    • sample code /
R
  • RAM content
    • forensic copies, creating /
  • real-world scenarios
    • Mobile Malware /
    • NSRLquery /
  • recovery image
    • creating /
  • regular expression
    • about /
    • re module /
  • rip-smb-uploads decoder
    • about /
  • rogue machines
    • creating /
  • rogue network interfaces
    • detecting /
S
  • Scapy
    • using /
    • URL /
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Mastering Python Forensics»

Look at similar books to Mastering Python Forensics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Mastering Python Forensics»

Discussion, reviews of the book Mastering Python Forensics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.