Conventions

In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning. Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: The constituency can be defined either as a domain such as local.example.com or an organization name such as Acme Inc. and associated subsidiary organizations.

A block of code is set as follows:

        rule PoisonIvy_Generic_3 {                 meta:                    description = "PoisonIvy RAT Generic Rule"                    author = "Florian Roth"                    date = "2015-05-14"                    hash = "e1cbdf740785f97c93a0a7a01ef2614be792afcd"                   strings:  $k1 = "Tiger324{" ...

Get Digital Forensics and Incident Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.