Chapter 8
File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System
Solutions in this chapter:
Case Scenario: James and the Flickering Green Light
Overview of the File Profiling Process
Working With Linux Executables
File Similarity Indexing
File Signature Identification and Classification
Embedded Artifact Extraction: ...
Get Malware Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.