December 2013
Intermediate to advanced
616 pages
14h 38m
English
• Linux Forensic Analysis Overview
• Malware Discovery and Extraction from a Linux System
• Examine Linux File System
• Examine Linux Configuration Files
• Keyword Searching
• Forensic Reconstruction of Compromised Linux Systems
• Advanced Malware Discovery and Extraction from a Linux System
If live system analysis can be considered surgery, forensic examination of Linux systems can be considered an autopsy of a computer impacted by malware. Trace evidence relating to a particular piece of malware may be found in various locations on the hard drive of a compromised host, including files, configuration ...