舉報

會員
Python Digital Forensics Cookbook
最新章節:
Conclusion
Ifyouareadigitalforensicsexaminer,cybersecurityspecialist,oranalystatheart,understandthebasicsofPython,andwanttotakeittothenextlevel,thisisthebookforyou.Alongtheway,youwillbeintroducedtoanumberoflibrariessuitableforparsingforensicartifacts.Readerswillbeabletouseandbuilduponthescriptswedeveloptoelevatetheiranalysis.
目錄(323章)
倒序
- coverpage
- Title Page
- Copyright
- Python Digital Forensics Cookbook
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Dedication
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Essential Scripting and File Information Recipes
- Introduction
- Handling arguments like an adult
- Getting started
- How to do it…
- How it works…
- There's more…
- Iterating over loose files
- Getting started
- How to do it…
- How it works…
- There's more…
- Recording file attributes
- Getting started
- How to do it…
- How it works…
- There's more…
- Copying files attributes and timestamps
- Getting started
- How to do it…
- How it works…
- There's more…
- Hashing files and data streams
- Getting started
- How to do it…
- How it works…
- There's more…
- Keeping track with a progress bar
- Getting started
- How to do it…
- How it works…
- There's more…
- Logging results
- Getting started
- How to do it…
- How it works…
- There’s more…
- Multiple hands make light work
- Getting started
- How to do it…
- How it works…
- There's more…
- Creating Artifact Report Recipes
- Introduction
- Using HTML templates
- Getting started
- How to do it...
- How it works...
- There's more...
- Creating a paper trail
- Getting started
- How to do it...
- How it works...
- There's more...
- Working with CSVs
- Getting started
- How to do it...
- How it works...
- There's more...
- Visualizing events with Excel
- Getting started
- How to do it...
- How it works...
- Auditing your work
- Getting started
- How to do it...
- How it works...
- There's more...
- A Deep Dive into Mobile Forensic Recipes
- Introduction
- Parsing PLIST files
- Getting started
- How to do it...
- How it works...
- There's more…
- Handling SQLite databases
- Getting started
- How to do it...
- How it works...
- Identifying gaps in SQLite databases
- Getting started
- How to do it...
- How it works...
- See also
- Processing iTunes backups
- Getting started
- How to do it...
- How it works...
- There's more...
- Putting Wi-Fi on the map
- Getting started
- How to do it...
- How it works...
- Digging deep to recover messages
- Getting started
- How to do it...
- How it works...
- There's more…
- Extracting Embedded Metadata Recipes
- Introduction
- Extracting audio and video metadata
- Getting started
- How to do it...
- How it works...
- There's more...
- The big picture
- Getting started
- How to do it...
- How it works...
- There's more...
- Mining for PDF metadata
- Getting started
- How to do it...
- How it works...
- There's more...
- Reviewing executable metadata
- Getting started
- How to do it...
- How it works...
- There's more...
- Reading office document metadata
- Getting started
- How to do it...
- How it works...
- Integrating our metadata extractor with EnCase
- Getting started
- How to do it...
- How it works...
- There's more...
- Networking and Indicators of Compromise Recipes
- Introduction
- Getting a jump start with IEF
- Getting started
- How to do it...
- How it works...
- Coming into contact with IEF
- Getting started
- How to do it...
- How it works...
- Beautiful Soup
- Getting started
- How to do it...
- How it works...
- There's more...
- Going hunting for viruses
- Getting started
- How to do it...
- How it works...
- Gathering intel
- Getting started
- How to do it...
- How it works...
- Totally passive
- Getting started
- How to do it...
- How it works...
- Reading Emails and Taking Names Recipes
- Introduction
- Parsing EML files
- Getting started
- How to do it...
- How it works...
- Viewing MSG files
- Getting started
- How to do it...
- How it works...
- There’s more...
- See also
- Ordering Takeout
- Getting started
- How to do it...
- How it works...
- There’s more...
- What’s in the box?!
- Getting started
- How to do it...
- How it works...
- Parsing PST and OST mailboxes
- Getting started
- How to do it...
- How it works...
- There’s more...
- See also
- Log-Based Artifact Recipes
- Introduction
- About time
- Getting started
- How to do it...
- How it works...
- There's more...
- Parsing IIS web logs with RegEx
- Getting started
- How to do it...
- How it works...
- There's more...
- Going spelunking
- Getting started
- How to do it...
- How it works...
- There's more...
- Interpreting the daily.out log
- Getting started
- How to do it...
- How it works...
- Adding daily.out parsing to Axiom
- Getting started
- How to do it...
- How it works...
- Scanning for indicators with YARA
- Getting started
- How to do it...
- How it works...
- Working with Forensic Evidence Container Recipes
- Introduction
- Opening acquisitions
- Getting started
- How to do it...
- How it works...
- Gathering acquisition and media information
- Getting started
- How to do it...
- How it works...
- Iterating through files
- Getting started
- How to do it...
- How it works...
- There's more...
- Processing files within the container
- Getting started
- How to do it...
- How it works...
- Searching for hashes
- Getting started
- How to do it...
- How it works...
- There's more...
- Exploring Windows Forensic Artifacts Recipes - Part I
- Introduction
- One man's trash is a forensic examiner's treasure
- Getting started
- How to do it...
- How it works...
- A sticky situation
- Getting started
- How to do it...
- How it works...
- Reading the registry
- Getting started
- How to do it...
- How it works...
- There's more...
- Gathering user activity
- Getting started
- How to do it...
- How it works...
- There's more...
- The missing link
- Getting started
- How to do it...
- How it works...
- There's more...
- Searching high and low
- Getting started
- How to do it...
- How it works...
- There's more...
- Exploring Windows Forensic Artifacts Recipes - Part II
- Introduction
- Parsing prefetch files
- Getting started
- How to do it...
- How it works...
- There's more...
- A series of fortunate events
- Getting started
- How to do it...
- How it works...
- There's more...
- Indexing internet history
- Getting started
- How to do it...
- How it works...
- There's more...
- Shadow of a former self
- Getting started
- How to do it...
- How it works...
- There's more...
- Dissecting the SRUM database
- Getting started
- How to do it...
- How it works...
- There's more...
- Conclusion 更新時間:2021-07-08 10:34:51
推薦閱讀
- Spring 5.0 Microservices(Second Edition)
- Microsoft Exchange Server PowerShell Cookbook(Third Edition)
- Beginning C++ Game Programming
- 大學計算機應用基礎實踐教程
- Python程序設計(第3版)
- C/C++算法從菜鳥到達人
- 編寫整潔的Python代碼(第2版)
- Web全棧工程師的自我修養
- 深度學習:算法入門與Keras編程實踐
- R Data Analysis Cookbook(Second Edition)
- Android嵌入式系統程序開發:基于Cortex-A8(第2版)
- 零基礎C#學習筆記
- Puppet:Mastering Infrastructure Automation
- Python GUI Programming Cookbook(Second Edition)
- Mastering Machine Learning with R
- 一步一步學Spring Boot:微服務項目實戰(第2版)
- Python面向對象編程(第4版)
- Mastering Data Analysis with R
- Building Microservices with .NET Core 2.0(Second Edition)
- 瘋狂Ajax講義(第3版)
- 企業級DevOps技術與工具實戰
- 計算機應用基礎實驗指導(第二版)
- Hybrid Cloud Management with Red Hat CloudForms
- Banana Pro Blueprints
- SproutCore Web Application Development
- Zabbix Network Monitoring Essentials
- 深入理解網站優化:提升網站轉化率的藝術與科學
- HBase入門與實踐(第2版)
- Hands-On Penetration Testing with Python
- JavaScript at Scale