Hacking Exposed Computer Forensics | Secrets & Solutions | Tutorial

“Computer forensics has become increasingly important to modern incident

responders attempting to defend our digital castles. Hacking Exposed Computer

Forensics, Second Edition, picks up where the first edition left off and provides a

valuable reference, useful to both beginning and seasoned forensic professionals. I

picked up several new tricks from this book, which I am already putting to use.”

—Monty McDougal, Raytheon Information Security Solutions, and author of

the Windows Forensic Toolchest

Part I Preparing for an Incident
▼ 1 The Forensics Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
▼ 2 Computer Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
▼ 3 Forensic Lab Environment Preparation . . . . . . . . . . . . . . . . . . . 41

Part II Collecting the Evidence
▼ 4 Forensically Sound Evidence Collection . . . . . . . . . . . . . . . . . . 63
▼ 5 Remote Investigations and Collections . . . . . . . . . . . . . . . . . . . . 97

Part III Forensic Investigation Techniques
▼ 6 Microsoft Windows Systems Analysis . . . . . . . . . . . . . . . . . . . . 131
▼ 7 Linux Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
▼ 8 Macintosh Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
▼ 9 Defeating Anti-forensic Techniques . . . . . . . . . . . . . . . . . . . . . . 197
▼ 10 Enterprise Storage Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
▼ 11 E-mail Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
▼ 12 Tracking User Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
▼ 13 Forensic Analysis of Mobile Devices . . . . . . . . . . . . . . . . . . . . . . 303

x Hacking Exposed Computer Forensics
** Part IV Presenting Your Findings**
▼ 14 Documenting the Investigation . . . . . . . . . . . . . . . . . . . . . . . . . . 341
▼ 15 The Justice System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

Part V Putting It All Together
▼ 16 IP Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
▼ 17 Employee Misconduct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
▼ 18 Employee Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
▼ 19 Corporate Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
▼ 20 Organized Cyber Crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
▼ 21 Consumer Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
▼ A Searching Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493

Go To Base64 & Decode:

aHR0cHM6Ly9tZWdhLm56L2ZpbGUvV1hvbkhZQkIjTVduTzJMaEJzQmt1MnI4bzNDWU9Xa0kzcG1YMEpTR1hmeTIyNXVWS0s0QQ==

Happy learning!

11 Likes