Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedication
Acknowledgments
Endorsements
List of figures
About the Author
About the Technical Editor
Foreword
Preface
Intended audience
Prerequisites
Reading this book
Supported platforms
Download software
Comments, questions, and contributions
Chapter 1: Why Python Forensics?
Abstract
Introduction
Cybercrime investigation challenges
How can the Python programming environment help meet these challenges?
Python and the Daubert evidence standard
Organization of the book
Chapter review
Summary questions
Chapter 2: Setting up a Python Forensics Environment
Abstract
Introduction
Setting up a python forensics environment
The right environment
Choosing a python version
Installing python on windows
Python packages and modules
What is included in the standard library?
Third-party packages and modules
Integrated development environments
Python on mobile devices
A virtual machine
Chapter review
Summary questions
Looking ahead
Chapter 3: Our First Python Forensics App
Abstract
Introduction
Naming conventions and other considerations
Our first application “one-way file system hashing”
Code walk-through
Results presentation
Chapter review
Summary questions
Looking ahead
Chapter 4: Forensic Searching and Indexing Using Python
Abstract
Introduction
Keyword context search
Code walk-through
Results presentation
Indexing
Coding isWordProbable
p-search complete code listings
Chapter review
Summary questions
Chapter 5: Forensic Evidence Extraction (JPEG and TIFF)
Abstract
Introduction
Code Walk-Through
Chapter review
Summary questions
Chapter 6: Forensic Time
Abstract
Introduction
Adding time to the equation
The time module
The Network Time Protocol
Obtaining and installing the NTP Library ntplib
World NTP Servers
NTP Client Setup Script
Chapter review
Summary questions
Chapter 7: Using Natural Language Tools in Forensics
Abstract
What is Natural Language Processing?
Installing the Natural Language Toolkit and associated libraries
Working with a corpus
Experimenting with NLTK
Creating a corpus from the Internet
NLTKQuery application
Chapter review
Summary questions
Chapter 8: Network Forensics: Part I
Abstract
Network investigation basics
Captain Ramius: re-verify our range to target… one ping only
Port scanning
Chapter review
Summary questions
Chapter 9: Network Forensics: Part II
Abstract
Introduction
Packet sniffing
Raw sockets in Python
Python Silent Network Mapping Tool (PSNMT)
PSNMT source code
Program execution and output
Chapter review
Summary question/challenge
Chapter 10: Multiprocessing for Forensics
Abstract
Introduction
What is multiprocessing?
Python multiprocessing support
Simplest multiprocessing example
Multiprocessing File Hash
Multiprocessing Hash Table generation
Chapter review
Summary question/challenge
Chapter 11: Rainbow in the Cloud
Abstract
Introduction
Putting the cloud to work
Cloud options
Creating rainbows in the cloud
Password Generation Calculations
Chapter review
Summary question/challenge
Chapter 12: Looking Ahead
Abstract
Introduction
Where do we go from here?
Conclusion
Index
← Prev
Back
Next →
← Prev
Back
Next →