Using open source tools to collect memory and analyze it as part of a forensic investigation.
INFORMATION INCLUDED IN THIS CHAPTER:
• Web browser artifacts
• Messaging artifacts
• E-mail artifacts
Most of our lives are lived on the Internet these days. Between e-mail, social networking, YouTube, and a wide variety of other Web sites we visit regularly, our access to the network is very common. In addition, our lives living inside of digital artifacts such as browsing habits, bookmarks, histories, e-mail archives, and logs of who we message, there is no point in pretending that the Internet is not an enormous pathway for attacks. This may come ...
Get Operating System Forensics now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.