Digital Forensics with Kali Linux: Perform data acquisition, data recovery, and network and malware analysis with Kali Linux, 2nd Edition

Digital Forensics with Kali Linux: Perform data acquisition, data recovery, and network and malware analysis with Kali Linux, 2nd Edition

English | 2020 | ISBN: 978-1838640804 | 350 Pages | PDF, EPUB | 392 MB

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations right from hashing to reporting
Kali Linux is a Linux-based distribution widely used for penetration testing and digital forensics. It has a wide range of tools to help in forensic investigations and incident response mechanisms.
This updated edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You’ll learn modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover the fundamentals of digital forensics and advances in the world of modern forensics, this Kali Linux book will delve into the realm of operating systems. You’ll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You’ll also learn how to create forensic images of data and maintain integrity using hashing tools. Finally, you’ll get to grips with advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography.
By the end of this book, you’ll have gained hands-on experience in implementing all the pillars of digital forensics acquisition, extraction, analysis, and presentation using Kali Linux tools.
What you will learn

  • Master powerful Kali Linux tools for digital investigation and analysis
  • Understand filesystems, storage, and data fundamentals
  • Discover incident response procedures and best practices
  • Perform memory and internet forensics with Volatility and Xplico
  • Carry out ransomware analysis using labs involving actual ransomware
  • Perform network forensics and analysis using Network Miner and other tools
Homepage