nexusstc/Practical Forensic Imaging: Securing Digital Evidence with Linux Tools/886b802aa1301783b2205c8fdc97ab2c.pdf
Practical Forensic Imaging : Securing Digital Evidence with Linux Tools 🔍
Bruce Nikkel
No Starch Press, Incorporated, 1, 2016-09-01
英语 [en] · PDF · 7.7MB · 2016 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
About the Author
Brief Contents
Contents in Detail
Foreword
Introduction
Why I Wrote This Book
How This Book Is Different
Why Use the Command Line?
Target Audience and Prerequisites
Who Should Read This Book?
Prerequisite Knowledge
Preinstalled Platform and Software
How the Book Is Organized
The Scope of This Book
Conventions and Format
Chapter 0: Digital Forensics Overview
Digital Forensics History
Pre-Y2K
2000-2010
2010-Present
Forensic Acquisition Trends and Challenges
Shift in Size, Location, and Complexity of Evidence
Multijurisdictional Aspects
Industry, Academia, and Law Enforcement Collaboration
Principles of Postmortem Computer Forensics
Digital Forensic Standards
Peer-Reviewed Research
Industry Regulations and Best Practice
Principles Used in This Book
Chapter 1: Storage Media Overview
Magnetic Storage Media
Hard Disks
Magnetic Tapes
Legacy Magnetic Storage
Non-Volatile Memory
Solid State Drives
USB Flash Drives
Removable Memory Cards
Legacy Non-Volatile Memory
Optical Storage Media
Compact Discs
Digital Versatile Discs
Blue-ray Discs
Legacy Optical Storage
Interfaces and Physical Connectors
Serial ATA
Serial Attached SCSI and Fibre Channel
Non-Volatile Memory Express
Universal Serial Bus
Thunderbolt
Legacy Interfaces
Commands, Protocols, and Bridges
ATA Commands
SCSI Commands
NVME Commands
Bridging, Tunneling, and Pass-Through
Special Topics
DCO and HPA Drive Areas
Drive Service and Maintenance Areas
USB Attached SCSI Protocol
Advanced Format 4Kn
NVME Namespaces
Solid State Hybrid Disks
Closing Thoughts
Chapter 2: Linux as a Forensic Acquisition Platform
Linux and OSS in a Forensic Context
Advantages of Linux and OSS in Forensics Labs
Disadvantages of Linux and OSS in Forensics Labs
Linux Kernel and Storage Devices
Kernel Device Detection
Storage Devices in /dev
Other Special Devices
Linux Kernel and Filesystems
Kernel Filesystem Support
Mounting Filesystems in Linux
Accessing Filesystems with Forensic Tools
Linux Distributors and Shells
Linux Distributions
The Shell
Command Execution
Piping and Redirection
Closing Thoughts
Chapter 3: Forensic Image Formats
Raw Images
Traditional dd
Forensic dd Variants
Data Recovery Tools
Forensic Formats
EnCase EWF
FTK SMART
AFF
SquashFS as a Forensic Evidence Container
SquashFS Background
SquashFS Forensic Evidence Containers
Closing Thoughts
Chapter 4: Planning and Preparation
Maintain an Audit Trail
Task Management
Taskwarrior
Todo.txt
Shell Alias
Shell History
Terminal Recorders
Linux Auditing
Organize Collected Evidence and Command Output
Naming Conventions for Files and Directories
Scalable Examination Directory Structure
Save Command Output with Redirection
Assess Acquisition Infrastructure Logisitcs
Image Sizes and Disk Space Requirements
File Compression
Sparse Files
Reported File and Image Sizes
Moving and Copying Forensic Images
Estimate Task Completion Times
Performance and Bottlenecks
Heat and Environmental Factors
Establish Forensic Write-Blocking Protection
Hardware Write Blockers
Software Write Blockers
Linux Forensic Boot CDs
Media with Physical Read-Only Modes
Closing Thoughts
Chapter 5: Attaching Subject Media to an Acquisition Host
Examine Subject PC Hardware
Physical PC Examination and Disk Removal
Subject PC Hardware Review
Attach Subject Disk to an Acquisition Host
View Acquisition Host Hardware
Identify the Subject Drive
Query the Subject Disk for Information
Document Device Identification Details
Query Disk Capabilities and Features with hdparm
Extract SMART Data with smartctl
Enable Access to Hidden Sectors
Remove a DCO
Remove a HPA
Drive Service Area Access
ATA Password Security and Self-Encrypting Drives
Identify and Unlock ATA Password-Protected Disks
Identify and Unlock Opal Self-Encrypting Drives
Encrypted Flash Thumb Drives
Attach Removable Media
Optical Media Drives
Magnetic Tape Drives
Memory Cards
Attach Other Storage
Apple Target Disk Mode
NVME SSDs
Other Devices with Block or Character Access
Closing Thoughts
Chapter 6: Forensic Image Acquisition
Acquire an Image with dd Tools
Standard Unix dd and GNU dd
The dcfldd and dc3dd Tools
Acquire an Image with Forensic Formats
The ewfacquire Tool
AccessData ftkimager
SquashFS Forensic Evidence Container
Acquire an Image to Multiple Destinations
Preserve Digital Evidence with Cryptography
Basic Cryptographic Hashing
Hash Windows
Sign an Image with PGP or S/MIME
RFC-3161 Timestampign
Manage Drive Failure and Errors
Forensic Tool Error Handling
Data Recovery Tools
SMART and Kernel Errors
Other Options for Failed Drives
Damaged Optical Discs
Image Acquisition over a Network
Remote Forensic Imaging with rdd
Secure Remote Imaging with ssh
Remote Acquisition to a SquashFS Evidence Container
Acquire a Remote Disk to EnCase or FTK Format
Live Imaging with Copy-On-Write Snapshots
Acquire Removable Media
Memory Cards
Optical Discs
Magnetic Tapes
RAID and Multidisk Systems
Proprietary RAID Acquisition
JBOD and RAID-0 Striped Disks
Microsoft Dynamic Disks
RAID-1 Mirrored Disks
Linux RAID-5
Closing Thoughts
Chapter 7: Forensic Image Management
Manage Image Compression
Standard Linux Compression Tools
EnCase EWF Compressed Format
FTK SMART Compressed Format
AFFlib Built-In Compression
SquashFS Compressed Evidence Containers
Manage Split Images
The GNU split Command
Split Images During Acquisition
Access a Set of Split Image Files
Reassemble a Split Image
Verify the Integrity of a Forensic Image
Verify the Hash Taken During Acquistion
Recalculate the Hash of a Forensic Image
Cryptographic Hashes of Split Raw Images
Identify Mismatched Hash Windows
Verify Signature and Timestamp
Convert Between Image Formats
Convert from Raw Images
Convert from EnCase/E01 Format
Manual Creation of SquashFS Container
Convert Files from EnCase to FTK
Convert from FTK Format
Convert from AFF Format
Secure an Image with Encryption
GPG Encryption
OpenSSL Encryption
Forensic Format Built-In Encryption
General Purpose Disk Encryption
Disk Cloning and Duplication
Prepare a Clone Disk
Use HPA to Replicate Sector Size
Write an Image File to a Clone Disk
Image Transfer and Storage
Write to Removable Media
Inexpensive Disks for Storage and Transfer
Perform Large Network Transfers
Secure Wiping and Data Disposal
Dispose of Individual Files
Secure Wipe a Storage Device
Issue ATA Security Erase Unit Commands
Destroy Encrypted Disk Keys
Closing Thoughts
Chapter 8: Special Image Access Topics
Forensically Acquired Image Files
Raw Image Files with Loop Devices
Forensic Format Image Files
Prepare Boot Images with xmount
VM Images
QEMU QCOW2
VirtualBox VDI
VMWare VMDK
Microsoft VHD
OS-Encrypted Filesystems
Microsoft BitLocker
Apple File Vault
Linux LUKS
TrueCrypt and VeraCrypt
Closing Thoughts
Chapter 9: Extracting Subsets of Forensic Images
Assess Partition Layout and Filesystems
Partition Scheme
Partition Tables
Filesystem Identification
Partition Extraction
Extract Individual Partitions
Find and Extract Deleted Partitions
Identify and Extract Inter-Partition Gaps
Extract HPA and DCO Sector Ranges
Other Piecewise Data Extraction
Extract Filesystem Slack Space
Extract Filesystem Unallocated Blocks
Manual Extraction Using Offsets
Closing Thoughts
Closing Remarks
Index
Brief Contents
Contents in Detail
Foreword
Introduction
Why I Wrote This Book
How This Book Is Different
Why Use the Command Line?
Target Audience and Prerequisites
Who Should Read This Book?
Prerequisite Knowledge
Preinstalled Platform and Software
How the Book Is Organized
The Scope of This Book
Conventions and Format
Chapter 0: Digital Forensics Overview
Digital Forensics History
Pre-Y2K
2000-2010
2010-Present
Forensic Acquisition Trends and Challenges
Shift in Size, Location, and Complexity of Evidence
Multijurisdictional Aspects
Industry, Academia, and Law Enforcement Collaboration
Principles of Postmortem Computer Forensics
Digital Forensic Standards
Peer-Reviewed Research
Industry Regulations and Best Practice
Principles Used in This Book
Chapter 1: Storage Media Overview
Magnetic Storage Media
Hard Disks
Magnetic Tapes
Legacy Magnetic Storage
Non-Volatile Memory
Solid State Drives
USB Flash Drives
Removable Memory Cards
Legacy Non-Volatile Memory
Optical Storage Media
Compact Discs
Digital Versatile Discs
Blue-ray Discs
Legacy Optical Storage
Interfaces and Physical Connectors
Serial ATA
Serial Attached SCSI and Fibre Channel
Non-Volatile Memory Express
Universal Serial Bus
Thunderbolt
Legacy Interfaces
Commands, Protocols, and Bridges
ATA Commands
SCSI Commands
NVME Commands
Bridging, Tunneling, and Pass-Through
Special Topics
DCO and HPA Drive Areas
Drive Service and Maintenance Areas
USB Attached SCSI Protocol
Advanced Format 4Kn
NVME Namespaces
Solid State Hybrid Disks
Closing Thoughts
Chapter 2: Linux as a Forensic Acquisition Platform
Linux and OSS in a Forensic Context
Advantages of Linux and OSS in Forensics Labs
Disadvantages of Linux and OSS in Forensics Labs
Linux Kernel and Storage Devices
Kernel Device Detection
Storage Devices in /dev
Other Special Devices
Linux Kernel and Filesystems
Kernel Filesystem Support
Mounting Filesystems in Linux
Accessing Filesystems with Forensic Tools
Linux Distributors and Shells
Linux Distributions
The Shell
Command Execution
Piping and Redirection
Closing Thoughts
Chapter 3: Forensic Image Formats
Raw Images
Traditional dd
Forensic dd Variants
Data Recovery Tools
Forensic Formats
EnCase EWF
FTK SMART
AFF
SquashFS as a Forensic Evidence Container
SquashFS Background
SquashFS Forensic Evidence Containers
Closing Thoughts
Chapter 4: Planning and Preparation
Maintain an Audit Trail
Task Management
Taskwarrior
Todo.txt
Shell Alias
Shell History
Terminal Recorders
Linux Auditing
Organize Collected Evidence and Command Output
Naming Conventions for Files and Directories
Scalable Examination Directory Structure
Save Command Output with Redirection
Assess Acquisition Infrastructure Logisitcs
Image Sizes and Disk Space Requirements
File Compression
Sparse Files
Reported File and Image Sizes
Moving and Copying Forensic Images
Estimate Task Completion Times
Performance and Bottlenecks
Heat and Environmental Factors
Establish Forensic Write-Blocking Protection
Hardware Write Blockers
Software Write Blockers
Linux Forensic Boot CDs
Media with Physical Read-Only Modes
Closing Thoughts
Chapter 5: Attaching Subject Media to an Acquisition Host
Examine Subject PC Hardware
Physical PC Examination and Disk Removal
Subject PC Hardware Review
Attach Subject Disk to an Acquisition Host
View Acquisition Host Hardware
Identify the Subject Drive
Query the Subject Disk for Information
Document Device Identification Details
Query Disk Capabilities and Features with hdparm
Extract SMART Data with smartctl
Enable Access to Hidden Sectors
Remove a DCO
Remove a HPA
Drive Service Area Access
ATA Password Security and Self-Encrypting Drives
Identify and Unlock ATA Password-Protected Disks
Identify and Unlock Opal Self-Encrypting Drives
Encrypted Flash Thumb Drives
Attach Removable Media
Optical Media Drives
Magnetic Tape Drives
Memory Cards
Attach Other Storage
Apple Target Disk Mode
NVME SSDs
Other Devices with Block or Character Access
Closing Thoughts
Chapter 6: Forensic Image Acquisition
Acquire an Image with dd Tools
Standard Unix dd and GNU dd
The dcfldd and dc3dd Tools
Acquire an Image with Forensic Formats
The ewfacquire Tool
AccessData ftkimager
SquashFS Forensic Evidence Container
Acquire an Image to Multiple Destinations
Preserve Digital Evidence with Cryptography
Basic Cryptographic Hashing
Hash Windows
Sign an Image with PGP or S/MIME
RFC-3161 Timestampign
Manage Drive Failure and Errors
Forensic Tool Error Handling
Data Recovery Tools
SMART and Kernel Errors
Other Options for Failed Drives
Damaged Optical Discs
Image Acquisition over a Network
Remote Forensic Imaging with rdd
Secure Remote Imaging with ssh
Remote Acquisition to a SquashFS Evidence Container
Acquire a Remote Disk to EnCase or FTK Format
Live Imaging with Copy-On-Write Snapshots
Acquire Removable Media
Memory Cards
Optical Discs
Magnetic Tapes
RAID and Multidisk Systems
Proprietary RAID Acquisition
JBOD and RAID-0 Striped Disks
Microsoft Dynamic Disks
RAID-1 Mirrored Disks
Linux RAID-5
Closing Thoughts
Chapter 7: Forensic Image Management
Manage Image Compression
Standard Linux Compression Tools
EnCase EWF Compressed Format
FTK SMART Compressed Format
AFFlib Built-In Compression
SquashFS Compressed Evidence Containers
Manage Split Images
The GNU split Command
Split Images During Acquisition
Access a Set of Split Image Files
Reassemble a Split Image
Verify the Integrity of a Forensic Image
Verify the Hash Taken During Acquistion
Recalculate the Hash of a Forensic Image
Cryptographic Hashes of Split Raw Images
Identify Mismatched Hash Windows
Verify Signature and Timestamp
Convert Between Image Formats
Convert from Raw Images
Convert from EnCase/E01 Format
Manual Creation of SquashFS Container
Convert Files from EnCase to FTK
Convert from FTK Format
Convert from AFF Format
Secure an Image with Encryption
GPG Encryption
OpenSSL Encryption
Forensic Format Built-In Encryption
General Purpose Disk Encryption
Disk Cloning and Duplication
Prepare a Clone Disk
Use HPA to Replicate Sector Size
Write an Image File to a Clone Disk
Image Transfer and Storage
Write to Removable Media
Inexpensive Disks for Storage and Transfer
Perform Large Network Transfers
Secure Wiping and Data Disposal
Dispose of Individual Files
Secure Wipe a Storage Device
Issue ATA Security Erase Unit Commands
Destroy Encrypted Disk Keys
Closing Thoughts
Chapter 8: Special Image Access Topics
Forensically Acquired Image Files
Raw Image Files with Loop Devices
Forensic Format Image Files
Prepare Boot Images with xmount
VM Images
QEMU QCOW2
VirtualBox VDI
VMWare VMDK
Microsoft VHD
OS-Encrypted Filesystems
Microsoft BitLocker
Apple File Vault
Linux LUKS
TrueCrypt and VeraCrypt
Closing Thoughts
Chapter 9: Extracting Subsets of Forensic Images
Assess Partition Layout and Filesystems
Partition Scheme
Partition Tables
Filesystem Identification
Partition Extraction
Extract Individual Partitions
Find and Extract Deleted Partitions
Identify and Extract Inter-Partition Gaps
Extract HPA and DCO Sector Ranges
Other Piecewise Data Extraction
Extract Filesystem Slack Space
Extract Filesystem Unallocated Blocks
Manual Extraction Using Offsets
Closing Thoughts
Closing Remarks
Index
备用文件名
lgli/practicalforensicimaging.pdf
备用文件名
lgrsnf/practicalforensicimaging.pdf
备用文件名
zlib/Computers/Security/Bruce Nikkel/Practical Forensic Imaging: Securing Digital Evidence with Linux Tools_18446337.pdf
备选作者
Nikkel, Bruce
备用版本
Penguin Random House LLC (Publisher Services), San Francisco, 2016
备用版本
United States, United States of America
备用版本
Sep 01, 2016
备用版本
1, PS, 2016
元数据中的注释
{"edition":"1","isbns":["1593277938","1593278004","1593278012","9781593277932","9781593278007","9781593278014"],"last_page":320,"publisher":"No Starch Press"}
备用描述
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.
Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.
You’ll learn how to:
• Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
• Protect attached evidence media from accidental modification
• Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
• Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
• Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
• Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
• Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media
With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.
Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.
You’ll learn how to:
• Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
• Protect attached evidence media from accidental modification
• Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
• Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
• Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
• Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
• Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media
With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.
备用描述
Storage media overview for postmortem acquisition -- Linux as a forensic acquisition platform -- Forensic image formats and acquisition tools -- Forensic imaging preparation and setup -- Attaching physical media to an acquisition host -- Forensic image acquisition -- Forensic image management -- Accessing logical, virtual, and operating system encrypted images -- Extracting subsets of forensic images
开源日期
2021-12-19
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.