Windows Forensics: The Field Guide for Corporate Computer Investigations

Chapter 1: Windows Forensics

CASE STUDY: THE MYSTERY TYPIST

Chapter 2: Processing the Digital Crime Scene

CASE STUDY: UNAUTHORIZED NETWORK DEVICE
CASE STUDY: REMOTE CORRUPTION
EVIDENCE COLLECTION KIT
CASE STUDY: ELECTRONIC DEVICE MISUSE
SHUTDOWN, UNPLUG, OR ANALYZE LIVE
EVIDENCE STORAGE

Chapter 3: Windows Forensics Basics

THE WORM DID IT!
WRITE BLOCKING
FLOPPY DISK REPAIR
TAPE BACKUP METHODS
CD/DVD REPAIR
CASE STUDY: MISSING USB KEY
HARD DISK PASSWORDS
RAID ARRAYS

Chapter 4: Partitions and File Systems

WINDOWS BOOT PROCESS
FIXING THE MBR
SECURE DATA WIPING
ALTERNATE DATA STREAMS
BYPASSING NTFS PERMISSIONS
SYMMETRIC AND PUBLIC KEY ENCRYPTION
CASE STUDY: FTP HACKER

Chapter 5: Directory Structure and Special Files

WINDOWS STARTUP INFORMATION
ENVIRONMENT VARIABLES
CASE STUDY: ALTERED HOSTS FILE
SECURITY IDENTIFIERS

Chapter 6: The Registry

WINDOWS REGISTRY FILE LOCATIONS
CASE STUDY: CD BURNING
AUTOSTART LOCATIONS

Chapter 8: Live System Analysis

ORDER OF VOLATILITY
WIRELESS MONITORING
NETWORK TRAFFIC RECONSTRUCTION
SNIFFER CABLE CONSTRUCTION
ROOTKITS

Chapter 9: Forensic Duplication

WRITE BLOCKING
ENCASE ENTERPRISE
CASE STUDY: MASS ACQUISITION

Chapter 10: File System Analysis

REGULAR EXPRESSIONS
HASH ALGORITHM SECURITY
STEGANOGRAPHY
FINDING COMPRESSED FILES

Chapter 11: Log File Analysis

EVENT LOG CORRUPTION
WINDOWS XP FIREWALL LOGS
HTTP LOG SAMPLE
CROSS SITE SCRIPTING AND SQL INJECTION
CASE STUDY: PHISHING

Chapter 12: Internet Usage Analysis

INTERNET-ACCEPTABLE USAGE POLICY

Chapter 13: Email Investigations

CASE STUDY: INAPPROPRIATE EMAIL USAGE
USENET AND NNTP
CASE STUDY: ACCIDENTAL DISCLOSURE
EMAIL HEADERS

Категории