Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Dedication
Copyright
Introduction
How to Use This book
Investigative Approach
Forensic Analysis in Malware Investigations
Applying Forensics to Malware
From Malware Analysis to Malware Forensics
Chapter 1. Linux Malware Incident Response
Introduction
Volatile Data Collection Methodology
Nonvolatile Data Collection from a Live Linux System
Conclusion
Appendix 1
Incident Response Tool Suites
Remote Collection Tools
Volatile Data Collection and Analysis Tools
Collecting Subject System Details
Identifying Users Logged into the System
Network Connections and Activity
Process Analysis
Loaded Modules
Opened Files
Command History
Appendix 2
Live Response: Field Notes
Appendix 3
Live Response: Field Interview Questions
Appendix 4
Pitfalls to Avoid
Selected Readings
← Prev
Back
Next →
← Prev
Back
Next →