ORPP logo

The Art of Memory Forensics : (Record no. 37904)

MARC details
000 -LEADER
fixed length control field 07678nam a22006253i 4500
001 - CONTROL NUMBER
control field EBC1740753
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729122903.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2014 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118825044
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118825099
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC1740753
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL1740753
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10895737
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL627089
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)883892214
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25L54 2014
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.50285/58
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hale Ligh, Michael.
245 14 - TITLE STATEMENT
Title The Art of Memory Forensics :
Remainder of title Detecting Malware and Threats in Windows, Linux, and Mac Memory.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Newark :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons, Incorporated,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2014.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (914 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- Acknowledgments -- Introduction -- Part I: An Introduction to Memory Forensics -- Chapter 1: Systems Overview -- Digital Environment -- PC Architecture -- Operating Systems -- Process Management -- Memory Management -- File System -- I/O Subsystem -- Summary -- Chapter 2: Data Structures -- Basic Data Types -- Summary -- Chapter 3: The Volatility Framework -- Why Volatility? -- What Volatility Is Not -- Installation -- The Framework -- Using Volatility -- Summary -- Chapter 4: Memory Acquisition -- Preserving the Digital Environment -- Software Tools -- Memory Dump Formats -- Converting Memory Dumps -- Volatile Memory on Disk -- Summary -- Part II: Windows Memory Forensics -- Chapter 5: Windows Objects and Pool Allocations -- Windows Executive Objects -- Pool-Tag Scanning -- Limitations of Pool Scanning -- Big Page Pool -- Pool-scanning Alternatives -- Summary -- Chapter 6: Processes, Handles, and Tokens -- Processes -- Process Tokens -- Privileges -- Process Handles -- Enumerating Handles in Memory -- Summary -- Chapter 7: Process Memory Internals -- What's in Process Memory? -- Enumerating Process Memory -- Summary -- Chapter 8: Hunting Malware in Process Memory -- Process Environment Block -- PE Files in Memory -- Packing and Compression -- Code Injection -- Summary -- Chapter 9: Event Logs -- Event Logs in Memory -- Real Case Examples -- Summary -- Chapter 10: Registry in Memory -- Windows Registry Analysis -- Volatility's Registry API -- Parsing Userassist Keys -- Detecting Malware with the Shimcache -- Reconstructing Activities with Shellbags -- Dumping Password Hashes -- Obtaining LSA Secrets -- Summary -- Chapter 11: Networking -- Network Artifacts -- Hidden Connections -- Raw Sockets and Sniffers -- Next Generation TCP/IP Stack -- Internet History -- DNS Cache Recovery -- Summary -- Chapter 12: Windows Services.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Service Architecture -- Installing Services -- Tricks and Stealth -- Investigating Service Activity -- Summary -- Chapter 13: Kernel Forensics and Rootkits -- Kernel Modules -- Modules in Memory Dumps -- Threads in Kernel Mode -- Driver Objects and IRPs -- Device Trees -- Auditing the SSDT -- Kernel Callbacks -- Kernel Timers -- Putting It All Together -- Summary -- Chapter 14: Windows GUI Subsystem, Part I -- The GUI Landscape -- GUI Memory Forensics -- The Session Space -- Window Stations -- Desktops -- Atoms and Atom Tables -- Windows -- Summary -- Chapter 15: Windows GUI Subsystem, Part II -- Window Message Hooks -- User Handles -- Event Hooks -- Windows Clipboard -- Case Study: ACCDFISA Ransomware -- Summary -- Chapter 16: Disk Artifacts in Memory -- Master File Table -- Extracting Files -- Defeating TrueCrypt Disk Encryption -- Summary -- Chapter 17: Event Reconstruction -- Strings -- Command History -- Summary -- Chapter 18: Timelining -- Finding Time in Memory -- Generating Timelines -- Gh0st in the Enterprise -- Summary -- Part III: Linux Memory Forensics -- Chapter 19: Linux Memory Acquisition -- Historical Methods of Acquisition -- Modern Acquisition -- Volatility Linux Profiles -- Summary -- Chapter 20: Linux Operating System -- ELF Files -- Linux Data Structures -- Linux Address Translation -- procfs and sysfs -- Compressed Swap -- Summary -- Chapter 21: Processes and Process Memory -- Processes in Memory -- Enumerating Processes -- Process Address Space -- Process Environment Variables -- Open File Handles -- Saved Context State -- Bash Memory Analysis -- Summary -- Chapter 22: Networking Artifacts -- Network Socket File Descriptors -- Network Connections -- Queued Network Packets -- Network Interfaces -- The Route Cache -- ARP Cache -- Summary -- Chapter 23: Kernel Memory Artifacts -- Physical Memory Maps -- Virtual Memory Maps.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Kernel Debug Buffer -- Loaded Kernel Modules -- Summary -- Chapter 24: File Systems in Memory -- Mounted File Systems -- Listing Files and Directories -- Extracting File Metadata -- Recovering File Contents -- Summary -- Chapter 25: Userland Rootkits -- Shellcode Injection -- Process Hollowing -- Shared Library Injection -- LD_PRELOAD Rootkits -- GOT/PLT Overwrites -- Inline Hooking -- Summary -- Chapter 26: Kernel Mode Rootkits -- Accessing Kernel Mode -- Hidden Kernel Modules -- Hidden Processes -- Elevating Privileges -- System Call Handler Hooks -- Keyboard Notifiers -- TTY Handlers -- Network Protocol Structures -- Netfilter Hooks -- File Operations -- Inline Code Hooks -- Summary -- Chapter 27: Case Study: Phalanx2 -- Phalanx2 -- Phalanx2 Memory Analysis -- Reverse Engineering Phalanx2 -- Final Thoughts on Phalanx2 -- Summary -- Part IV: Mac Memory Forensics -- Chapter 28: Mac Acquisition and Internals -- Mac Design -- Memory Acquisition -- Mac Volatility Profiles -- Mach-O Executable Format -- Summary -- Chapter 29: Mac Memory Overview -- Mac versus Linux Analysis -- Process Analysis -- Address Space Mappings -- Networking Artifacts -- SLAB Allocator -- Recovering File Systems from Memory -- Loaded Kernel Extensions -- Other Mac Plugins -- Mac Live Forensics -- Summary -- Chapter 30: Malicious Code and Rootkits -- Userland Rootkit Analysis -- Kernel Rootkit Analysis -- Common Mac Malware in Memory -- Summary -- Chapter 31: Tracking User Activity -- Keychain Recovery -- Mac Application Analysis -- Summary -- Index.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Malware (Computer software).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks--Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Réseaux informatiques. eclas.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Délits informatiques. eclas.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Sécurité informatique. eclas.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mémorisation des données. eclas.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes. fast (OCoLC)fst00872063.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks--Security measures. fast (OCoLC)fst00872341.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security. fast (OCoLC)fst00872484.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Malware (Computer software) fast (OCoLC)fst01748230.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Case, Andrew.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Levy, Jamie.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Walters, Aaron.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Hale Ligh, Michael
Title The Art of Memory Forensics
Place, publisher, and date of publication Newark : John Wiley & Sons, Incorporated,c2014
International Standard Book Number 9781118825099
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1740753">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=1740753</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.