Operating System Forensics

Operating System Forensics

4.11 - 1251 ratings - Source

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book. Covers digital forensic investigations of the three major operating systems, including Windows, Linux, and Mac OS Presents the technical details of each operating system, allowing users to find artifacts that might be missed using automated tools Hands-on exercises drive home key concepts covered in the book. Includes discussions of cloud, Internet, and major mobile operating systems such as Android and iOSIn the case of Android devices, users are looking to root it, which means gain root level access. This root ... Google actually provides an easy way for users to get even deeper access to their systems by enabling developer access. This is really ... client on it. As soon as you have connected to FIGURE 11.3 the phone, you have command line access to ROOTING/JAILBREAKING 307 Rooting/ jailbreaking.

Title:Operating System Forensics
Author:Ric Messier
Publisher:Syngress - 2015-11-12


You Must CONTINUE and create a free account to access unlimited downloads & streaming