0x01 malware forensics2009.02.25 09:43




Table of Contents

Ch. 1 Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System
Ch. 2 Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System
Ch. 3 Memory Forensics: Analyzing Physical and Process Memory Dumps for Malware Artifacts
Ch. 4 Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Windows Systems
Ch. 5 Post-Mortem Forensics: Discovering and Extracting Malware and Associated Artifacts from Linux Systems
Ch. 6 Legal Considerations
Ch. 7 File Identification and Profiling: Initial Analysis of a Suspect File on a Windows System
Ch. 8 File Identification and Profiling: Initial Analysis of a Suspect File On a Linux System
Ch. 9 Analysis of a Suspect Program: Windows
Ch. 10 Analysis of a Suspect Program: Linux

Phases

Phase 1: Forensic preservation and examination of volatile data (Chapter 1 and 2)
Phase 2: Examination of memory (Chapter 3)
Phase 3: Forensic Analysis: Examination os hard drives (Chapter 4 and 5)
Phase 4: Static analysis of malware (Chapter 7 and 8)
Phase 5: Dynamic analysis of malware *Chapter 9 and 10)



ZIZIHACKER 형님이 주신 책이다.
책 다 보면 돌려보라시는데 솔직히 내 책 다른사람 줄 맘은 없고
여기에 정리해 놔야겠다.
누구나 볼 수 있게...

혹시나 틀린 내용이나 잘못된 내용이 있다면 말씀해주시길...

 

신고
크리에이티브 커먼즈 라이선스
Creative Commons License
Posted by demantos

댓글을 달아 주세요


티스토리 툴바