In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: The constituency can be defined either as a domain such as or an organization name such as Acme Inc. and associated subsidiary organizations.

A block of code is set as follows:

        rule PoisonIvy_Generic_3 {                 meta:                    description = "PoisonIvy RAT Generic Rule"                    author = "Florian Roth"                    date = "2015-05-14"                    hash = "e1cbdf740785f97c93a0a7a01ef2614be792afcd"                   strings:  $k1 = "Tiger324{" ...

Get Digital Forensics and Incident Response now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.