舉報

會員
Python Digital Forensics Cookbook
最新章節:
Conclusion
Ifyouareadigitalforensicsexaminer,cybersecurityspecialist,oranalystatheart,understandthebasicsofPython,andwanttotakeittothenextlevel,thisisthebookforyou.Alongtheway,youwillbeintroducedtoanumberoflibrariessuitableforparsingforensicartifacts.Readerswillbeabletouseandbuilduponthescriptswedeveloptoelevatetheiranalysis.
目錄(323章)
倒序
- coverpage
- Title Page
- Copyright
- Python Digital Forensics Cookbook
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Dedication
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Conventions
- Reader feedback
- Customer support
- Downloading the example code
- Downloading the color images of this book
- Errata
- Piracy
- Questions
- Essential Scripting and File Information Recipes
- Introduction
- Handling arguments like an adult
- Getting started
- How to do it…
- How it works…
- There's more…
- Iterating over loose files
- Getting started
- How to do it…
- How it works…
- There's more…
- Recording file attributes
- Getting started
- How to do it…
- How it works…
- There's more…
- Copying files attributes and timestamps
- Getting started
- How to do it…
- How it works…
- There's more…
- Hashing files and data streams
- Getting started
- How to do it…
- How it works…
- There's more…
- Keeping track with a progress bar
- Getting started
- How to do it…
- How it works…
- There's more…
- Logging results
- Getting started
- How to do it…
- How it works…
- There’s more…
- Multiple hands make light work
- Getting started
- How to do it…
- How it works…
- There's more…
- Creating Artifact Report Recipes
- Introduction
- Using HTML templates
- Getting started
- How to do it...
- How it works...
- There's more...
- Creating a paper trail
- Getting started
- How to do it...
- How it works...
- There's more...
- Working with CSVs
- Getting started
- How to do it...
- How it works...
- There's more...
- Visualizing events with Excel
- Getting started
- How to do it...
- How it works...
- Auditing your work
- Getting started
- How to do it...
- How it works...
- There's more...
- A Deep Dive into Mobile Forensic Recipes
- Introduction
- Parsing PLIST files
- Getting started
- How to do it...
- How it works...
- There's more…
- Handling SQLite databases
- Getting started
- How to do it...
- How it works...
- Identifying gaps in SQLite databases
- Getting started
- How to do it...
- How it works...
- See also
- Processing iTunes backups
- Getting started
- How to do it...
- How it works...
- There's more...
- Putting Wi-Fi on the map
- Getting started
- How to do it...
- How it works...
- Digging deep to recover messages
- Getting started
- How to do it...
- How it works...
- There's more…
- Extracting Embedded Metadata Recipes
- Introduction
- Extracting audio and video metadata
- Getting started
- How to do it...
- How it works...
- There's more...
- The big picture
- Getting started
- How to do it...
- How it works...
- There's more...
- Mining for PDF metadata
- Getting started
- How to do it...
- How it works...
- There's more...
- Reviewing executable metadata
- Getting started
- How to do it...
- How it works...
- There's more...
- Reading office document metadata
- Getting started
- How to do it...
- How it works...
- Integrating our metadata extractor with EnCase
- Getting started
- How to do it...
- How it works...
- There's more...
- Networking and Indicators of Compromise Recipes
- Introduction
- Getting a jump start with IEF
- Getting started
- How to do it...
- How it works...
- Coming into contact with IEF
- Getting started
- How to do it...
- How it works...
- Beautiful Soup
- Getting started
- How to do it...
- How it works...
- There's more...
- Going hunting for viruses
- Getting started
- How to do it...
- How it works...
- Gathering intel
- Getting started
- How to do it...
- How it works...
- Totally passive
- Getting started
- How to do it...
- How it works...
- Reading Emails and Taking Names Recipes
- Introduction
- Parsing EML files
- Getting started
- How to do it...
- How it works...
- Viewing MSG files
- Getting started
- How to do it...
- How it works...
- There’s more...
- See also
- Ordering Takeout
- Getting started
- How to do it...
- How it works...
- What’s in the box?!
- Getting started
- How to do it...
- How it works...
- Parsing PST and OST mailboxes
- Getting started
- How to do it...
- How it works...
- There’s more...
- See also
- Log-Based Artifact Recipes
- Introduction
- About time
- Getting started
- How to do it...
- How it works...
- There's more...
- Parsing IIS web logs with RegEx
- Getting started
- How to do it...
- How it works...
- There's more...
- Going spelunking
- Getting started
- How to do it...
- How it works...
- There's more...
- Interpreting the daily.out log
- Getting started
- How to do it...
- How it works...
- Adding daily.out parsing to Axiom
- Getting started
- How to do it...
- How it works...
- Scanning for indicators with YARA
- Getting started
- How to do it...
- How it works...
- Working with Forensic Evidence Container Recipes
- Introduction
- Opening acquisitions
- Getting started
- How to do it...
- How it works...
- Gathering acquisition and media information
- Getting started
- How to do it...
- How it works...
- Iterating through files
- Getting started
- How to do it...
- How it works...
- There's more...
- Processing files within the container
- Getting started
- How to do it...
- How it works...
- Searching for hashes
- Getting started
- How to do it...
- How it works...
- There's more...
- Exploring Windows Forensic Artifacts Recipes - Part I
- Introduction
- One man's trash is a forensic examiner's treasure
- Getting started
- How to do it...
- How it works...
- A sticky situation
- Getting started
- How to do it...
- How it works...
- Reading the registry
- Getting started
- How to do it...
- How it works...
- There's more...
- Gathering user activity
- Getting started
- How to do it...
- How it works...
- There's more...
- The missing link
- Getting started
- How to do it...
- How it works...
- There's more...
- Searching high and low
- Getting started
- How to do it...
- How it works...
- There's more...
- Exploring Windows Forensic Artifacts Recipes - Part II
- Introduction
- Parsing prefetch files
- Getting started
- How to do it...
- How it works...
- There's more...
- A series of fortunate events
- Getting started
- How to do it...
- How it works...
- There's more...
- Indexing internet history
- Getting started
- How to do it...
- How it works...
- There's more...
- Shadow of a former self
- Getting started
- How to do it...
- How it works...
- There's more...
- Dissecting the SRUM database
- Getting started
- How to do it...
- How it works...
- There's more...
- Conclusion 更新時間:2021-07-08 10:34:51
推薦閱讀
- Advanced Quantitative Finance with C++
- Learning Microsoft Windows Server 2012 Dynamic Access Control
- 程序員修煉之道:程序設計入門30講
- Visual Basic 6.0程序設計計算機組裝與維修
- Learning Selenium Testing Tools(Third Edition)
- 計算機應用基礎實踐教程
- 單片機C語言程序設計實訓100例
- 深度學習原理與PyTorch實戰(第2版)
- 計算機應用基礎(第二版)
- Mastering Concurrency in Python
- 分布式架構原理與實踐
- TypeScript圖形渲染實戰:2D架構設計與實現
- Raspberry Pi Robotic Projects
- JavaScript高級程序設計(第4版)
- Python程序設計教程
- Django 3 Web Development Cookbook
- Python程序設計現代方法
- C語言進階:重點、難點與疑點解析
- TensorFlow.NET實戰
- 機器人ROS開發實踐
- MATLAB/Simulink建模與仿真
- 計算機視覺增強現實應用程序開發
- C語言程序設計新編教程
- AngularJS Test:driven Development
- MariaDB Cookbook
- 企業微信開發詳解
- 網絡安全Java代碼審計實戰
- Learning Android Google Maps
- Mastering Kali Linux Wireless Pentesting
- 視覺之外:全鏈路UI設計思維的培養與提升