

Buy anything from 5,000+ international stores. One checkout price. No surprise fees. Join 2M+ shoppers on Desertcart.
Desertcart purchases this item on your behalf and handles shipping, customs, and support to Bolivia.
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack. Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. Youโll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used. Learn how to: Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryption Investigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applications Reconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical login Perform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashes Examine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distros Perform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux system Reconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifacts Analyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settings Identify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity Review: 10/10 - 10/10 Review: Deadbox Linux Forensics Guide - While a casual user of Linux operating systems, Iโm primarily trained and familiar with forensically examining Windows OS. After studying this book, and testing various topics referenced, I am more familiar of the investigative value of the artifacts presented throughout - from filesystems to pattern of life activity. Undoubtedly, I am now more informed on performing deadbox forensics on a Linux OS. The book well is organized. Going through each chapter, I felt that I wasnโt left behind and was able to build on the information I comprehended from the previous chapter. I think Nikkel found an appropriate balance with the detail presented for the scope of this book - analysis of deadbox Linux operating systems. The book is now marked up and tabbed so I can always reach out and reference the valuable information it contains.
| Best Sellers Rank | #625,039 in Books ( See Top 100 in Books ) #129 in Linux Networking & System Administration #271 in Computer Hacking #435 in Computer Network Security |
| Customer Reviews | 4.7 out of 5 stars 68 Reviews |
S**P
10/10
10/10
D**K
Deadbox Linux Forensics Guide
While a casual user of Linux operating systems, Iโm primarily trained and familiar with forensically examining Windows OS. After studying this book, and testing various topics referenced, I am more familiar of the investigative value of the artifacts presented throughout - from filesystems to pattern of life activity. Undoubtedly, I am now more informed on performing deadbox forensics on a Linux OS. The book well is organized. Going through each chapter, I felt that I wasnโt left behind and was able to build on the information I comprehended from the previous chapter. I think Nikkel found an appropriate balance with the detail presented for the scope of this book - analysis of deadbox Linux operating systems. The book is now marked up and tabbed so I can always reach out and reference the valuable information it contains.
C**G
Bought it for a class.
It was suitable for the class
S**L
Excellent e-book
This book is fantastic to read, great to understand and a very helpful guide for Digital Forensics & Investigation.
Trustpilot
1 month ago
3 weeks ago