Using open source tools to collect memory and analyze it as part of a forensic investigation.
Keywords
operating systems
forensics
operating environments
INFORMATION INCLUDED IN THIS CHAPTER:
• Writing Style
• Artifacts
• Reporting Considerations
• Reporting Requirements
• Report Samples
• Testifying
Introduction
Once you have completed your investigation, no matter what type of investigation it is, you will probably have to generate a report. In other words, you want to convey your findings in a way that can be easily understood. You will probably have acquired a fair amount of data and you will not want to simply hand it all over. One of your tasks as a forensic investigator or incident responder is performing some ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.