Book description
Written by a specialist in digital crime, this book helps you leverage the power of the FTX platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.
In Detail
With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals achieve these goals. It is extremely useful for conducting digital investigations, helping you conduct a thorough investigation through a single tool and ensure the integrity of evidence. It is hard to find technical information on this tool and that's where this book will come in handy, helping professionals perform their activities with greater excellence.
This tutorial leads by example, providing you with everything you need to use FTK and the tools included such as FTK Imager, Registry View, and PRTK in order to enhance your Computer Forensics knowledge in an easier and more efficient way.
You will be introduced to the background of Computer Forensics, which include the types of digital devices that can be acquired and how to prepare for a new case of investigation. You will become acquainted with the FTK architecture and learn how to leverage its features in order to help you find the evidence as fast as possible. Through this book, you will also learn the memory forensics technique using the memory dump feature of FTK Imager. Furthermore, you will learn how to extract some important information such as process and DLL information, Sockets, and Driver List Open Handles.
To conclude your tutorial, you will learn how to extract information from Windows Registry and how to recover passwords from the system and files. You will find this book an invaluable supplement to teach you all the steps required for the completion of investigations on digital media and to generate consistent and irrefutable evidence in court.
What You Will Learn
- Get started with Computer Forensics using the FTK platform to conduct your digital investigation
- Acquire different types of digital devices with integrity
- Find evidence in Windows registry hives using Registry View
- Understand the use of PRTK for password recovery
- Narrowing the case using filters and keyword searches
- Analyze Internet artifacts and e-mail messages
- Report results using the bookmarks features
- Learn tips and tricks to get the most out of your digital investigation results
Table of contents
-
Computer Forensics with FTK
- Table of Contents
- Computer Forensics with FTK
- Credits
- About the Author
- About the Reviewers
- www.packtpub.com
- Preface
- 1. Getting Started with Computer Forensics Using FTK
- 2. Working with FTK Imager
- 3. Working with Registry View
- 4. Working with FTK Forensics
- 5. Processing the Case
- 6. New Features of FTK 5
- 7. Working with PRTK
- Index
Product information
- Title: Computer Forensics with FTK
- Author(s):
- Release date: March 2014
- Publisher(s): Packt Publishing
- ISBN: 9781783559022
You might also like
book
Network Forensics
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT …
book
Mastering Windows Network Forensics and Investigation, 2nd Edition
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making …
book
Hands-On Network Forensics
Gain basic skills in network forensics and learn how to apply them effectively Key Features Investigate …
book
Computer Forensics InfoSec Pro Guide
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of …